You are on page 1of 34

ACLC College of Butuan

Technical Education Department


HDS Bldg., 999 J.C. Aquino Avenue, Butuan City

THE EFFECTIVENESS OF FACIAL RECOGNITION IN


ENTRY PROCESS OF ACLC COLLEGE
OF BUTUAN EMPLOYEE

A Research Project
Presented to the Faculty of
Technical Education Department

In Partial Fulfillment of
the requirements for the 3 Year TESDA Diploma Program

Submitted by:
Jay Alpuerto
Hana Loren G. Balberan
Honeylyn Baylon
Jezamie V. Bayron
Joshua Rama

MAY 2023
APPROVAL SHEET
ACKNOWLEDGEMENT
DEDICATION
ABSTRACT
TABLE OF CONTENTS

Approval Sheet...............................................................................................................1

Acknowledgement..........................................................................................................2

Dedication......................................................................................................................3

Abstract..........................................................................................................................4

Table of Contents...........................................................................................................5

List of Tables / Figure / Notations.................................................................................7

CHAPTER 1...................................................................................................................8

INTRODUCTION..........................................................................................................8

1.1 Background of the Study.................................................................................8

1.2 Statement of the Problem.....................................................................................8

1.3 Objectives.............................................................................................................8

1.3.1 General Objectives........................................................................................8

1.3.2 Specific Objectives........................................................................................8

1.4 Significance of the Study.....................................................................................8

1.5 Scope and De/Limitations of the Study...............................................................8

1.5.1 Scope.............................................................................................................8

1.5.2 Limitation......................................................................................................8

1.6 Definition of Terms..............................................................................................8

CHAPTER 2...................................................................................................................9
REVIEW OF RELATED LITERATURE.....................................................................9

2.1 Theoretical Framework........................................................................................9

2.2 Conceptual Framework........................................................................................9

2.3 Related Literature (AT LEAST 5 STUDIES)......................................................9

CHAPTER 3.................................................................................................................10

DESIGN AND METHODOLOGY.............................................................................10

3.1 Research Design.................................................................................................10

3.2 Research Locale.................................................................................................10

3.3 Sampling Design................................................................................................10

3.4 Research Participants.........................................................................................10

3.5 Data Gathering...................................................................................................10

3.6 Data Analysis.....................................................................................................10

Chapter 4......................................................................................................................11

RESULTS AND DISCUSSIONS................................................................................11

4.1 Results and Discussion.......................................................................................11

Chapter 5......................................................................................................................12

SUMMARY, CONCLUSIONS AND rECOMMENDATIONS.................................12

5.1 Summary of Findings.........................................................................................12

5.2 Conclusions........................................................................................................12

5.3 Recommendation................................................................................................12

Bibliography.................................................................................................................13
Appendices...................................................................................................................14
LIST OF TABLES / FIGURE / NOTATIONS
CHAPTER 1

INTRODUCTION

1.1 BACKGROUND OF THE STUDY

In today's world of computer vision, face recognition is one of the most

advanced technologies. Facial recognition is promoted as something that makes our

lives more convenient. Instead of having to bother to write for personal details, for

example, or needing to show ID for manual entry process, our faces will be enough

to verify who we are.

According to a report of William Crumpler in the Center for Strategic &

International Studies (CSI) in 2020, accuracy is greater when identification

techniques are used to identify people to clear, stable images. According to the

report, when utilized in this manner, face recognition algorithms can achieve

accuracy ratings of up to 99.97 percent on the Facial Recognition Vendor Test

conducted by the National Institute of Standards and Technology. However,

accuracy rates are typically lower in the real world particularly when people weren’t

looking straight at the camera or were partially obscured by shadows or other

objects, error rates increased.

Furthermore, Face recognition as a way to verify the identity of a person is a

distinctive and inherently reliable identification method, A. J. A. Virata and E. D.

Festijo, "Understanding the Acceptance of a Face Recognition-Based Identity

Verification System: An Input to its Design and Development in the Philippines,"


(2019). Attendance monitoring has strategic importance for every organization. In

addition, attendance issue are among the most challenging issues in different aspects

of employment or schools. In the study of Philippines Education Higher Research

Journals, ”The system will save time decrease the measure of work needed to do

and will supplant the stationary materials with a computer based system.” Claro et.

al(2019).

Moreover, there is an existing system application, operated in ACLC College

of Butuan for all the employees’ entry process. Therefore, the researchers want to

know the effectiveness of using facial recognition as an attendance management

system. This study will test the accuracy and capabilities of existing facial

recognition in order to operate it in wider users in the future.


1.2 STATEMENT OF THE PROBLEM

The researchers would like to know if the facial recognition is effective upon

entering of ACLC College of Butuan Employees in school premises.

This study seeks an answer to the following:

1. How accurate is existing facial recognition can detect the employees

face.

a. Is there any history of malfunction during entry facial

recognition?

2. How convenient using facial recognition in terms of:

a. Time consumed

b. Data security

1.3 OBJECTIVES

The researchers aim to conduct this study to assess the effectiveness of

Facial recognition as entry process of Employees: Faculty, Staff, Utility and

Students Assistant of ACLC College of Butuan. In order to test how capable existing

facial recognition can manage the attendance management system to address the

problem.

1.4 SIGNIFICANCE OF THE STUDY

This study will beneficial and significant to the following:

Faculty and Staff. This study would be beneficial to the faculty for them to know

how effective and secured facial recognition to their day to day entry process in the

school premises.
Student. This study would be beneficial to students for them to understand the

realities about the school operations and the importance of facial recognition and the

basic services that are expected to be provided by the school.

School Administration. The results may provide information as basis for policy

formulation and improvement of school services provided to the students of ACLC

College of Butuan. This may help stakeholders to provide assistance in the provision

of school facilities to be included in the school improvement plan.

Future Researchers. This may serve as basis for those research enthusiasts to

conduct further inquiry regarding school service quality and employees satisfaction.

1.5 SCOPE AND DELIMITATION OF THE STUDY

This study assesses the effectiveness of facial recognition in entry process.

The respondents of this study will be the Employees of ACLC College of Butuan

and this will be conducted in academic year 2022-2023.

1.5 DEFINITION OF TERMS

Employees – faculty, staff, utility, student assistant members who are using

the existing facial recognition and the persons who are the respondents of the study.

Entry Process – the procedure in which the employees do the time in and

time out through facial recognition.

Existing Facial Recognition- it is the operating system stationed at school

admission office responsible to record the employees daily attendance

Facial Recognition – is a system technology that can minimize the

inconvenience of ACLC students.


School Premises – it is where the research been conducted and where the

participants encounter the entry process.


CHAPTER 2

REVIEW OF RELATED LITERATURE

2.1 THEORETICAL FRAMEWORK

This research was based on the study of Jadhav et al. (2017) in Automated

Attendance System using Face Recognition. Where he stated,” Automated Attendance

Systems based on face recognition techniques thus proved to be time saving and

secured. This system can also be used to identify an unknown person”. They used

Viola-Jones Algorithm face detection which detect human face using cascade

classifier and Principal Component Analysis (PCA) algorithm for feature selection

and Support Vector Machine (SVM) for classification. When compared to traditional

attendance marking this system saves the time and also helps to monitor the persons

on the organization
2.2 CONCEPTUAL FRAMEWORK
The Conceptual Framework, will help the researchers understand how

efficient, secured and convenient facial recognition on the employees in ACLC

Butuan. The researcher will begin by collecting the average number of employees

who go through entry process of entering the school premises. Followed by the

facial recognition system service for employees attendance management. Then

effectiveness in implementing facial recognition in entering the school premises.


2.3 RELATED LITERATURE

Face recognition is a biometric identification method that matches patterns to

identify people based on information about their faces. Face recognition software

offers a distinct technical benefit (Jiang, 2019). The are a number of existing systems

closely related to the proposed idea of marking attendance in work space by making

use of facial recognition techniques and algorithms. Based on the uniqueness and

progress of facial recognition and identification technology, many research groups at

home and abroad have started extensive research. Clyde Gomes, Sagar Chanchal,

Tanmay Desai, and Dipti Jadha develop a system that make use of DNN to detect the

faces of employees and PCA and LDA algorithm for image matching and a SVM and

CNN. With a database of eleven photos, they were able to reach an accuracy of 86%.

The database was generated by taking individual frames from a picture of the

employees and storing them in the database. The authors created a system that

connects the database to a web administration server system using a raspberry pi

camera module that is mounted on the door.f an image captured by the Raspberry Pi

satisfies the criteria for the Local Binary pattern algorithm, it is mage stored in the

database, a servo motor opens the door for the teachers.

Facial recognition in the workplace bring impact to employees daily work.  

Improved security is one of the most significant benefits of facial recognition systems,

which can be used as part of a multi-factor authentication (MFA) system. For

example, most email accounts use an MFA system; the most common is a text

message sent with a unique code. Biometric authentication can also be used as part of

an MFA system. As biometric facial recognition cannot be duplicated or copied, the

most significant benefit is preventing unauthorized personnel from entering a

building. Facial recognition software records the faces of everyone who has access,
and the software can recognize employees who have the correct access permissions.

This is particularly important if your business handles sensitive information or your

building requires restricted access to certain areas. Furthermore, a biometric clock that

uses facial recognition will keep information safer than a manual attendance system

ever could. Facial recognition will also keep employees’ schedules, wage information,

and other sensitive information confidential and accessible only to that employee.

Jiang J., Chen C., Huang K., Cai Z., Hu R. Noise robust position-patch based

face super-resolution via tikhonov regularized neighbor representation, the author

proposes a new face SR method based on the Tikhonov Regularized Neighborhood

Representation (TRNR). It can overcome the technical bottleneck of the patch

presentation system in the traditional SR method of neighboring embedded image. In

Chrysos G. G., Antonakos E., Snape P., Asthana A., Zafeiriou S. The author first used

the newly introduced 300 VW benchmark to fully evaluate the most advanced

deformed face tracking pipeline. Many different architectures were then analyzed that

focused on web-based face tracking. In particular, the authors compared the following

general strategies: (a) universal face recognition plus general face landmark location,

(b) general model-free tracking and general face orientation, and (c) mixed advanced

face recognition. , model free tracking and face orientation localization techniques.

In Zhao Q., Ge S. S., Ye M., Liu S., He W. Learning saliency features for face

detection and recognition using multi-task network, the authors propose a key feature

learning method that responds only in the face region. Based on the main features, the

authors also developed a joint face detection and recognition pipeline as part of the
human-computer interaction (HRI) system for SRU robots. An experimental paper

analyzes the effect of the visibility term on face recognition and the ability to

distinguish LFW salient features. And the experimental results of FDDB confirm the

effectiveness of the proposed method in face recognition. In  Bong K., Choi S., Kim

C., Yoo H. J. Low-power convolution neural network processor for a face-recognition

system, the authors propose a face recognition system based on a low-power

convolution neural network (CNN) for user recognition in smart devices. The system

consists of two chips: an always-on CMOS image sensor (CIS) for imaging and face

detection, and a low-power CNN processor (CNNP) for face verification (FV). The

research results show that the CIS function integrated in the FD accelerator can

realize face image event-driven chip communication only when a face is present.

Grys B. T., Lo D. S., Sahin N., et al. Machine learning and computer vision

approaches for phenotype profiling, the author applied computer vision technology

for cell segmentation and feature extraction. The authors outline common computer

vision and machine learning methods for phenotype profiling and classification, and

the growing need for efficient computational strategies to analyze large-scale image-

based data. Computer vision techniques have been developed to aid in phenotype

classification and clustering information from biological images. In Gadelmawla E. S.

Computer vision algorithms for measurement and inspection of external screw

threads, the author applied computer vision technology to visual inspection systems,

presented a vision system for automatic measurement and detection of most wire

types, and developed many image processing and computer vision algorithms for

analyzing captured images.


In  Paithane P. Framework for Attendance Management using face

recognition, most of the content consists of three parts, namely face feature

representation, feature extraction, and classification. The face representation specifies

how the face is displayed and defines the incremental detection and recognition

algorithm. Evaluate face recognition that considers shape and texture information to

speak images based on local binary patterns for personalized free face recognition. In

Nasution M. Z. Face recognition based feature extraction using principal component

analysis (PCA), the authors plan to create facial patterns stored in a digital image

database. The process of pattern formation and face recognition starts from object

face image, side detection, pattern generation to face pattern-like detection and then

face recognition. In this study, a program was developed to test some face data

samples stored in a digital image database to ensure the similarity of detected face

patterns and represent them using PCA.


CHAPTER 3

DESIGN AND METHODOLOGY

3.1 RESEARCH DESIGN

Descriptive design is used to collect information about variables without

changing the environment. According to Gray et al., (2013), descriptive designs may

be used to identify problems in current practice, make judgments, or even develop

theories. This research design will systematically obtain information to describe a

phenomenon, situation, or population. More specifically, it helps answer the what,

when, where, and how questions regarding this research about Effectiveness of

Facial Recognition in Entry Process of ACLC College of Butuan Employee.

3.2 RESEARCH LOCALE

Map of ACLC College of Butuan, Retrieved from Google Maps


3.3 SAMPLING DESIGN

This study will use simple random sampling in conducting the survey

because the researcher will just distribute the survey questionnaire randomly to

employee available in the campus. The number of samples to be taken will be

derived by using the Slovin’s formula.

3.4 RESEARCH PARTICIPANTS

The participants of this study are the employee including the Staff, Utility

and Students Assistant of ACLC College of Butuan. The table below shows the

distribution of participants.

Department Population Sample

CED 10 5

TED 10 5

BED 10 5

GED 10 5

S.A 10 5

UTILITY 10 5

STAFF 10 5
3.5 DATA GATHERING

The following steps were followed in gathering of data:

Permission to Conduct the Study. A letter of endorsement from School

Director will be secured. Then, letter permission from School Administrator will be

secured to conduct the study on effectiveness of facial recognition. After the approval,

the researchers prepared the letter addressed to the employee to formally conduct the

survey.

The researchers will administer the questionnaire personally to the respondents

of the study and they will be requested to answer the questionnaire honestly so that

valid and reliable data could be elicited. Prior to the distribution of the instrument, the

researcher explained the purpose of conducting the survey. One hundred percent

(100%) of the completely answered questionnaire will be retrieved.

3.6 DATA ANALYSIS

The study is conducted through Analysis of Variance

The analysis of variance (ANNOVA) is used to determine if there is a difference

between means of two unrelated groups on the same continuous dependent variable.

Pearson Product Moment Correlation Coefficient

The Pearson correlation coefficient is the most common and widely use measure of

the degree of linear relationship between two variables.


CHAPTER 4

RESULTS AND DISCUSSIONS

4.1 RESULTS AND DISCUSSION


CHAPTER 5

SUMMARY, CONCLUSIONS AND RECOMMENDATIONS

5.1 SUMMARY OF FINDINGS

5.2 CONCLUSIONS

5.3 RECOMMENDATION
BIBLIOGRAPHY
APPENDICES
2X2 PICTURE
WHITE BACKGROUP
FORMAL ATTIRE

YOUR NAME HERE


Home Address
Contact Number
Personal email addres

COMPETENCY SYPNOSIS
 Visual Graphic Design NC II holder
 Web Development NC II holder

PERSONAL INFORMATION

Age 27
Date of Birth December 25, 2023
Civil Status Single
Citizenship Filipino
Sex Male
Religion Muslim
EDUCATION BACKGROUND
TERTIARY:

SECONDARY:

PRIMARY:
2X2 PICTURE
WHITE BACKGROUP
FORMAL ATTIRE

YOUR NAME HERE


Home Address
Contact Number
Personal email addres

COMPETENCY SYPNOSIS
 Visual Graphic Design NC II holder
 Web Development NC II holder

PERSONAL INFORMATION

Age 27
Date of Birth December 25, 2023
Civil Status Single
Citizenship Filipino
Sex Male
Religion Muslim
EDUCATION BACKGROUND
TERTIARY:

SECONDARY:

PRIMARY:
2X2 PICTURE
WHITE BACKGROUP
FORMAL ATTIRE

YOUR NAME HERE


Home Address
Contact Number
Personal email addres

COMPETENCY SYPNOSIS
 Visual Graphic Design NC II holder
 Web Development NC II holder

PERSONAL INFORMATION

Age 27
Date of Birth December 25, 2023
Civil Status Single
Citizenship Filipino
Sex Male
Religion Muslim
EDUCATION BACKGROUND
TERTIARY:

SECONDARY:

PRIMARY:
2X2 PICTURE
WHITE BACKGROUP
FORMAL ATTIRE

YOUR NAME HERE


Home Address
Contact Number
Personal email addres

COMPETENCY SYPNOSIS
 Visual Graphic Design NC II holder
 Web Development NC II holder

PERSONAL INFORMATION

Age 27
Date of Birth December 25, 2023
Civil Status Single
Citizenship Filipino
Sex Male
Religion Muslim
EDUCATION BACKGROUND
TERTIARY:

SECONDARY:

PRIMARY:
2X2 PICTURE
WHITE BACKGROUP
FORMAL ATTIRE

YOUR NAME HERE


Home Address
Contact Number
Personal email addres

COMPETENCY SYPNOSIS
 Visual Graphic Design NC II holder
 Web Development NC II holder

PERSONAL INFORMATION

Age 27
Date of Birth December 25, 2023
Civil Status Single
Citizenship Filipino
Sex Male
Religion Muslim
EDUCATION BACKGROUND
TERTIARY:

SECONDARY:

PRIMARY:

You might also like