Вы находитесь на странице: 1из 5

IJSTE - International Journal of Science Technology & Engineering | Volume 2 | Issue 10 | April 2016

ISSN (online): 2349-784X

Smart Attendance with USB Security


Bhagyashri Dharmik
Scholar
Department of Computer Science & Engineering
Priyadarshini Bhagwati Collage of Engineering, Nagpur

Gayatri Bhujade
Scholar
Department of Computer Science & Engineering
Priyadarshini Bhagwati Collage of Engineering, Nagpur

D B Khadse
Assistant Professor
Department of Computer Science & Engineering
Priyadarshini Bhagwati Collage of Engineering, Nagpur

D V Jamthe
Assistant Professor
Department of Computer Science & Engineering
Priyadarshini Bhagwati Collage of Engineering, Nagpur

Y B Malode
Assistant Professor
Department of Computer Science & Engineering
Priyadarshini Bhagwati Collage of Engineering, Nagpur

Abstract
"Keen participation with USB Security" is about the administration of participation through an enhanced innovation of face
location. Our task deals with the procedure of detecting so as to check participation face. In this firstly we have USB begin of
undertaking by which the venture begins. At that point through administrator login we can move advance then understudies login
should be possible in which they will first enter the id and secret word and after that the face can be recognized. Facial
acknowledgment or face acknowledgment as it is frequently alluded to as, investigation qualities of a man's face picture data
through a camera. It gauges general facial structure, separations between eyes, nose, mouth, and jaw edges. These estimations are
held in a database and utilized as an examination when a client remains before the camera. Generally understudy's participation
is taken physically by utilizing participation sheet, given by the employee in class. The Present participation stamping strategies
are dreary and tedious. Physically recorded participation can be effectively controlled. Also, it is extremely hard to check one by
one understudy in a vast classroom environment with appropriated branches whether the validated understudies are really
reacting or not. The information or pictures got by the camera are sent to a PC modified framework for further investigation. The
got pictures are then contrasted and an arrangement of reference pictures of each of the workers or understudies and stamp the
relating participation. Being a standout amongst the best uses of the picture handling, face acknowledgment has a fundamental
part in specialized field particularly in the field of security reason. Human face acknowledgment is an imperative field for
confirmation reason particularly on account of understudy's participation.
Keywords: ODA, CV algorithm
________________________________________________________________________________________________________
I.

INTRODUCTION

As in ordinary life, while being an understudy or a worker in organization, we need to take after participation which is vital for
our general execution. Till now we have just seen the manual participation handle yet our task is presenting the idea of
computerized participation. Our venture haves the advanced participation through face recognition. Face identification gives
more security to the procedure of participation and no one can give intermediary participation. We are likewise going to add
highlight of USB security to our task so that the venture gets to be secured totally and unapproved individuals couldn't get to the
undertaking. The fundamental point behind this venture is to diminish paper work of keeping up participation and secured
procedure to enhance nature of framework.
The world is moving towards digitization. Indeed, even India has begun to contribute in the computerized perspectives by
presenting the system "Advanced India". We as a native of India has additionally chosen to contribute for it by chipping away at
the venture "Keen Participation with USB Security". The principle point behind this undertaking is to diminish paper work of
keeping up participation and secured procedure to enhance nature of framework.
II. MOVING OBJECT DETECTION ALGORITHM (ODA)
Moving thing recognizable proof is constantly the starting stride of a typical observation system. In this structure 'EMUG-CV'
calculation is used. This estimation manages got picture according to measurement of face. Moving thing distinguishing proof
goes for removing moving articles that are captivating out of an establishment which can be static or component. Taking after
resulting methodology are inconceivably dependent on the execution of this stage, it is important that the requested closer view
pixels accurately contrast with the moving objects of interests.

All rights reserved by www.ijste.org

20

Smart Attendance with USB Security


(IJSTE/ Volume 2 / Issue 10 / 005)

III. EMUG CV ALGORITHM


Emug CV computation is generally used for face area and face affirmation. This figuring wears down got shaded picture
however at the back end it takes a shot at the exhausting picture. This figuring measures the measurement (width,height,length)of
go up against and differentiated it and they got face. In the event that the got and the recognized face get composed then here the
cooperation of particular understudy is stamped else it signals face not distinguished.
This algorithm splits the process of detection and recognition into the fallowing steps:
1) Getting the camera to work i.e to provide live feed.
2) Detecting human face with an identifier.
3) Saving the detecting face with the saved faces.
4) Training our recognition with the saved face.
5) Carrying out recognition against the trained system.
IV. FACE DETECTION
This figuring is used for face area. Where it is used as a piece of both making database and face affirmation process. Where if
making database it takes data picture through a web camera reliably. Gotten picture encounters face acknowledgment.
Recognized face will be altered and set away in database. Where if there ought to emerge an event of face affirmation if there is
any improvement video observation will be used to perceive the moving article. The got picture encounters face area and further
took care of later by face affirmation.
V. METHODOLOGY
This proposed structure presents another customized cooperation checking system, which arranges video observation and face
affirmation computations into the method of investment organization. The system is executed using a non-interfering web
camera presented at the way of room, if there is any advancement it get the photo. The got picture experience faces ID and goes
up against affirmation, recognizes and removes all faces from the got pictures. After appearances have been removed, they are
differentiated and a present database of understudy pictures and upon successful affirmation an understudy support once-over is
made and spared cash on a database.
This work is being carried out in five stages:
Step 1: Generating Data for Training
Database will be made using web camera. Where gotten picture will encounters confront acknowledgment. After a face has been
recognized, the rectangle encasing this face is trimmed and took care of later by the face affirmation module. This rectangle
identifies with a lone face, and ensuing to being trimmed as a photo and it will be secured in database.
Step 2: Face Detection
Emug cv and Open cv figuring is used for face revelation. Face area is used as a piece of both making database and face
affirmation. In case there is any advancement video observation will be used to recognize the moving thing. The got picture
encounters face distinguishing proof and further arranged later by face affirmation. This technique confines the facial zone from
whatever is left of the establishment picture. By virtue of video streams, appearances can be taken after using a face taking after
section.
Step 3: Face Alignment
This methodology focus on finding the best constraint and institutionalization of the face; where the recognizable proof step for
the most part gages the position of the face, this step plots the facial parts, for instance, face outline, eyes, nose, ears and mouth.
A while later institutionalization with respect to geometrical changes, for instance, size and stance, despite photometrical
properties, for instance, edification and dull scale happen.
Step 4: Face Recognition
Association framework is used for face affirmation. Where after face recognizable proof picture encounters face affirmation
process, where test picture will be appeared differently in relation to planning pictures all together with perform face affirmation.
Step 5: Attendance Registry Updating
After face affirmation process it looks the understudy database and enters the support if it true blue in database. The removed
parts are appeared differently in relation to those set away in the database, and decisions are made by satisfactory trust in the
match score.

All rights reserved by www.ijste.org

21

Smart Attendance with USB Security


(IJSTE/ Volume 2 / Issue 10 / 005)

Fig. 1:

VI. MODULES
USB Authentication
Right when the endorsed individual affixss the USB then simply the endeavor will start. In this firstly we have USB start of
undertaking by which the endeavor starts.
Admin login
Resulting to interfacing USB the administrator login will be asked in which id and secret key must be entered to then essentially
advance methodology will be done. The official should have the ability to enter the each one of the customers' (understudies,
educator and indicating accomplices) information and makes IDs and passwords for them to get to the structure. Names speakers
and teaching help to the courses while adding new educators to the system. Careful to give another mystery word on the event of
the customers sitting above their login purposes of hobby. Counting new courses every semester for the understudies to enlist to.
Teacher login.
The demonstrating staff needs a successful and tried and true automated system for recording the understudy's interest in the
midst of locations, zones, labs and exams. This system should have the ability to figure and process the execution of understudies
according to their investment rates.
Students login
The understudy needs to screen his investment. This would oblige him to login using his ID and mystery word to the system. The
structure will recognize him if his ID and mystery key are the same as the ones saved in the database and a page will appear by
understudy's advantages.
At whatever show the understudy needs hold their speculation then they need to login first and after that structure will take sneak
top of face to see with past support one if organize then hobby is finished. Every understudy will have id and secret key.
Detention list
We are correspondingly trying to join the fragment in which month to month repression once-over can be showed up by areas.

All rights reserved by www.ijste.org

22

Smart Attendance with USB Security


(IJSTE/ Volume 2 / Issue 10 / 005)

VII. RESULT
Login Screen

Fig. 2: The Login Screen will accept UserID and Password to proceed further.

Teacher login

Fig. 3: The Teacher will register for particular lecture.

Student login

Fig. 4: Students mark their attendance by detecting face.

All rights reserved by www.ijste.org

23

Smart Attendance with USB Security


(IJSTE/ Volume 2 / Issue 10 / 005)

Detention list

Fig. 5:

VIII. CONCLUSION
It can be done up from the above talk that a trustworthy, secure, speedy and a capable system has been made supplanting a
manual and inconsistent structure. This structure can be executed for better results as for the organization of support and gets out.
This system will save time, diminish the measure of work the association needs to do and will supplant the stationery material
with electronic mechanical get together. From this time forward a system with expected results has been made however there is
still some chance to show signs of improvement. For future redesign same method can be realized for logout. Where other face
affirmation technique can in like manner be used for same proposed methodology as a piece of solicitation procures better
precision.
REFERENCE
[1]
[2]
[3]
[4]
[5]
[6]

Takeo kanade. Introduction to the Special Section on Video Surveilliance.Proc of IEEE Transaction on Pattern analysis and Machine Intelligence, 2000.
XiaoshiZheng, Huimin Wu, An Automatic Moving Object Detection Algorithm For Video Surveillance Applications,Proc of IEEE International
Conferences on Embedded Software and Systems,2009.
Naveed Khan Balcoh TRFID-Based Students Attendance Management System, International Journal of Scientific & Engineering Research Volume 4, Issue
2, February-2013
M. IramBaig,Algorithm For Efficient Attendance Management: FaceRecognition Based Approach,International Journal Of Computer Science Issues, Vol.
9, Issue 4, No 1, July 2012.
AshimSaha, and M. HaroonYousaf Study of Implementing Automated Attendance System Using Face Recognition Technique,International Journal of
Computer and Communication Engineering, Vol. 1, No. 2, July 2012.
Development of Attendance Management System using Biometric by Waqar Ahmad .The Pacific Journal of Science and Technology Volume 13.Number
1. May 2012 (spring).

All rights reserved by www.ijste.org

24

Вам также может понравиться