Академический Документы
Профессиональный Документы
Культура Документы
Technology 1
Amafel Building, Aguinaldo Highway, Dasmariñas City 4114
Engineering and Architecture Department
CHAPTER 1
Introduction
individual's facial features mathematically and stores the data as a face print.
The software uses deep learning algorithms to compare a live capture or digital
with Facial Recognition” allows the students to borrow equipment and materials
The advantages of such a system over using paper are clear as they can
gain control and keep track of everything in one place, manage their stock levels
and new orders, create stock alerts, and easily share inventory locations with all
lab borrowers so everyone is up to date and in the security of the items. The
system can easily detect the students who are responsible for the return of all the
negligence will be entirely billed to the student’s school account. Failure to settle
the liability may cause a hold on student’s account for future enrollment.
For this reason, the proponents developed the project “NCST Engineering
Tools Borrowing System with Facial Recognition” that can improve the manual
Secondly, it has many of process that results to a time hold for the time of
comprises of numerous flaws that could lead into an inefficient transaction. For
an instance, borrowing equipment during laboratory abates when there are many
of equipment and materials to borrow which hinders the time of the professors to
teach their students. Furthermore, the laboratory tools borrowing operator tends
to struggle when there are multiple students borrowing equipment in the tools
system only uses tangible transaction records that can easily be lost and forged.
National College of Science and
Technology 4
Amafel Building, Aguinaldo Highway, Dasmariñas City 4114
Engineering and Architecture Department
General Statement
equipment?
2. How does laboratory operator encounter difficulties for example having
hard time locating tools especially if they do not have enough background
General Objective
reduce the idle time in the classroom while borrowing laboratory tools, and to
Specific Objectives
1. To come up with an idea that will reduce the idle time in the classroom.
2. To locate tools quickly using digital device.
3. To have an intangible and secured transaction database.
Theoretical Framework
National College of Science and
Technology 6
Amafel Building, Aguinaldo Highway, Dasmariñas City 4114
Engineering and Architecture Department
science education by Hellen (2005) in her study there are number of factors that
affect learning from laboratory other than the task itself. Students’ understanding
of the purpose of the lab and its context has been found very important. Where
and when the laboratory takes place is another important factor. If students may
work with the same laboratory in different settings, for example in a leisure
environment and in school, the result from the laboratory will be quite different
with each other during lab sessions in zoology, Wickman (2002) has shown that
students made very few generalizations based on what they saw in the
laboratory. They took much more attention from what they had read in the
interpreted as if the students lack the ability to make their own generalizations
2006). The quality of the task given to students, how the task is presented and to
what extent the students are given the opportunity to explore the full potential of
situations.
Conceptual Framework
National College of Science and
Technology 8
Amafel Building, Aguinaldo Highway, Dasmariñas City 4114
Engineering and Architecture Department
This part includes the Input, Process, and Output model of the project. It also
shows all the required information, processes to be considered and the expected
where the input stage for the pc, the model process where the contents of input
National College of Science and
Technology 9
Amafel Building, Aguinaldo Highway, Dasmariñas City 4114
Engineering and Architecture Department
stage are being process and connected to the pc and comes up to the output of
the project.
Scope
The borrowers can access only if they have registered in the system.
The database allows the operator to add and delete user accounts as well
borrowed item.
This also allows the operator to report inventory every end of the month.
system is for future references and to inform the operator which items are
frequently borrow.
National College of Science and
Technology 11
Amafel Building, Aguinaldo Highway, Dasmariñas City 4114
Engineering and Architecture Department
Limitation.
To the Instructor This project can help them to have more teaching time to
their students. They can also start the laboratory activity immediately without any
distractions.
To the Students This study may serve as a guide and reference for the
students conducting similar studies. This will also help them to improve their
learning capabilities
To NCST This project aims to help the ATLO office about manual process
of borrowing engineering tools, also for the operator who don’t have enough
To the Future Proponents The ideas used by the proponents for this study
can help to enhance their knowledge and skills in their own study. This will also
Definition of Terms
Facial Recognition
other areas of use. In fact, facial recognition technology has received significant
DATABASE
contain multiple tables, which may each include several different fields? For
example, a company database may include tables for products, employees, and
financial records. Each of these tables would have different fields that are
NETWORK
LAN
or office building
National College of Science and
Technology 15
Amafel Building, Aguinaldo Highway, Dasmariñas City 4114
Engineering and Architecture Department
CHAPTER 2
This chapter consists of various related literatures and studies that guide
the proponents in preparing the manuscript and the proposed project. It includes
sources. There are many literature and studies in foreign than local. This chapter
consists of various related literature and studies about Facial recognition, also for
Foreign Literature
Eigen face
Pent land and Moghaddam (2001), as cited by Tolba, and Harby on their
recognition process. The main idea is to work with differences between face
images, rather than with single face images. In this way the recognition problem
contains information of whether the two subtracted images belong to the same
class or to different classes. In this case the number of training images per class
classifier can be used for performing the recognition. The system proposed in
In 2001, Turk and Pent land used PCA projections as the feature vectors
similarity function. This system, later called Eigen faces, was the first Eigen
space-based face recognition approach and, from then on, many Eigen space-
based systems have been proposed using different projection methods and
National College of Science and
Technology 17
Amafel Building, Aguinaldo Highway, Dasmariñas City 4114
Engineering and Architecture Department
FLD as projection algorithm in the so-called Fisher faces system. In all standard
A Page on a Website:
and rely on the techniques from machine learning to find the relevant
have also been used successfully for face recognition problem. The advantage of
using the neural networks for face recognition is that the networks can be trained
to capture more knowledge about the variation of face patterns, and thereby
propagation (BP) algorithm has been mostly used. However, the convergence of
the MLP networks is slow and the global minima of the error space may not be
always achieved. On the other hand, the RBF neural networks have fast learning
ability and best approximation property. So, in recent times, many researches
have used RBF networks for face recognition and show in figure. However, their
success rates are not so promising as the error rates vary from 5 to 9% under
variation of pose, orientation, scale and light. This may be due to the fact that the
selection of the centers of the hidden layer neurons might not have been done by
capturing the knowledge about the distribution of training patterns and variations
A Page on a Website:
Graph Matching
objects are represented by sparse graphs, whose vertices are labeled with a
transputers. extended the technique and matched human faces against a gallery
of 112 neutral frontal view faces. Probe images were distorted due to rotation in
depth and changing facial expression. Encouraging results on faces with large
rotation angles were obtained. They reported recognition rates of 86.5% and
66.4% for the matching tests of 111 faces of 15-degree rotation and 110 faces of
A Page on a Website:
Tolba, and Harby (2001). Face Recognition: A Literature Review,
retrieve from https://www.researchgate.net/publication
Fisher face
Fisher’s Linear
that it tries to “shape” the scatter in order to make it more reliable for
The FLD remove the problem of eigenface method in Pentland by taking the
lighting condition
A Page on a Website:
Foreign Studies
area network
on university campuses and inside corporations, and they have started to appear
network components.
metrics to model user mobility. We also analyze user and load distribution across
access points. We compare our results with those from previous studies to
extract and explain several network usage and mobility characteristics. We find
by which users are present than by the number of users. We model user mobility
prevalence reflects the frequency with which users visit various locations. We
find that the probability distributions of both measures follow power laws.
A Page on a Website:
common carrier. Local area networks use this low-cost, high speed transmission
There are two basic issues in local area network design. First, how should
communication at minimum cost? With the low cost of the raw transmission
low. Second, what protocols should be used for the operation of the network?
National College of Science and
Technology 24
Amafel Building, Aguinaldo Highway, Dasmariñas City 4114
Engineering and Architecture Department
While many protocol problems are common to local area networks and long-haul
networks such as ARPANET, new protocols are required to exploit the extended
area networks and long-haul networks and presents a case study which
describes in the detail the host computer interface hardware required for a typical
local area network. This study talks about Lan (Local Area Network) what are the
basic issues in local area network, cost and reliability, The study really help us
the proponents of the proposed project by giving us the idea how Lan works.
A Page on a Website:
The system recognize face by a variation of LBPH. They use this method
of regression of local binary features to get the landmark of face image whose
computational complexity is very low. They utilize these landmark points which
can be trained to align the face, to extract the facial features. By calculating the
Local Binary Patterns Histogram (LBPH) of these landmark points and its
neighborhood pixels, they can extract effective facial feature to realize face
recognition. This method can increase the calculating speed of LBPH and also
can improve the recognition rate. This project helps us proponents to understand
National College of Science and
Technology 25
Amafel Building, Aguinaldo Highway, Dasmariñas City 4114
Engineering and Architecture Department
how facial recognition process works and this is very suited for our proposed
project.
A Page on a Website:
the past decade in computer vision. However, the law enforcement agencies are
inadequate to identify and recognize any person through the video monitoring
lighting are still the major problems in face recognition. Our proposed system
operates better at the minimum low resolution of 35px to identify the human face
in various angles, side poses and tracking the face during human motion. We
have designed the dataset (LR500) for training and classification. This project
address the human face recognition in real time at the low level of resolution.
A Page on a Website:
Local Literature
And it seems that companies are now taking notice of society’s changing
lifestyle.
Computers are being compared with the human brains. Like the Brain the
advised if, the computer can take data and process it, it can store the data either
in raw form or in processing result and can deliver the raw processed data to the
outside world demand. Computer works in a very fast way that you can ever
other countries has flowed to us. Imagine running a school with large population
of students and how will you handle it. Also, it affects the kind of environment we
have. In this country not all business people can provide the needs of their
National College of Science and
Technology 27
Amafel Building, Aguinaldo Highway, Dasmariñas City 4114
Engineering and Architecture Department
companies. But still with the help of other technology we create a strategy on
how will we go on with this kind of problem. People create a system that supports
either big or small company, is reasonable because these systems meet the
requirements of the company and best solutions are suited both environment and
networked environment.
especially during the past several years. At least two reasons account for this
trend: the first is the wide range of commercial and law enforcement applications,
unsolved problem. In other words, current systems are still far away from the
face recognition research. There are two underlying motivations for us to write
this survey paper: the first is to provide an up-to-date review of the existing
literature, and the second is to offer some insights into the studies of machine
A Page on a Website:
Criminal Police Office) and the Bundesamt fur Sicherheit in der Information
Technik (Federal Office for Security in Information Technology). To sum up, the
for use with identification documents and, if certain criteria are met, performance
effects. The results obtained from the BioP I project are being verified during the
BioP II project on the basis of a larger test group and being compared with the
biometric methods of iris and fingerprint recognition. BioP II, the follow-up project
expected to result from a large-scale field test with more than 2000 participants.
A Page on a Website:
Image Training and LBPH Based Algorithm for Face Tracking in Different B
Video and video types are changing day by day; due to which, video
overcome the challenges that are being faced nowadays. This paper describes a
model for detection and tracking of human faces in different background video
sequence using OpenCV platform. Both positive and negative image samples
National College of Science and
Technology 30
Amafel Building, Aguinaldo Highway, Dasmariñas City 4114
Engineering and Architecture Department
are trained and saved as xml file. With the help of trained samples, LBPH
algorithm clarifies whether the video frame contain faces or not. Further, HOG
descriptor is fed to SVM detector to compute the coefficients that are stored in
the xml file. Based on this, face regions are tracked until the last frame is
proposed algorithm. Test results indicate the superiority of our proposed model,
A Page on a Website:
Ranganatha (2018). Image Training and LBPH Based Algorithm for Face
Tracking in Different Background Video Sequence retrieve from
https://www.ijcseonline.org
National College of Science and
Technology 31
Amafel Building, Aguinaldo Highway, Dasmariñas City 4114
Engineering and Architecture Department
Local Studies
Bismaros, Dulay, and Ignacio (2013), stated that a Local Area Network
and Wireless Simulator is a type of networking that will let the users choose a
computer laboratory that will send the data to the target PC. The system has the
different types of topologies which are bus, ring, and star. It also has the wireless
Hub. With the help of this system, user can network the computer in a short
information. The two types of network that can be developed in home are
wireless network and traditional wired network (Ethernet). With regards the
computer.
National College of Science and
Technology 32
Amafel Building, Aguinaldo Highway, Dasmariñas City 4114
Engineering and Architecture Department
application software. The main propose of the study is to develop a system which
will provide its beneficiaries with information about the different network
topologies and how data is transferred within them. Each time the user needs to
connect to the computer, the program allows the user to choose from the three
Once the user had already chosen from the three options, the program could
allow the user to send the data to the target PC. The proposed system provides
option for the user in the types of topologies namely Bus, Star, and Ring. At that
time, the program can connect to the computer with the help of the PC Hub.
The program would solve the networking problem and will send the data by
know which is better, the proponents conducted a survey. The respondents, who
are the students of Our Lady of Fatima University, participated in answering the
survey and testing the system and resolve which is better than the existing
A Page on a Website:
Bismanos Jr. (2013). Local Area Network Wired and Wireless Simulator
retrieved from https://ejournals.ph
National College of Science and
Technology 33
Amafel Building, Aguinaldo Highway, Dasmariñas City 4114
Engineering and Architecture Department
spoofing by employing efficient scene texture analyzing. To this end, the scene of
input and reference images are divided into same non-overlapped blocks and the
texture pattern of each block is extracted by local binary pattern (LBP) operator.
To reduce the sensitivity of LBP to noise and also to increase the reliability of the
proposed method, first input image transformed to YCbCr color space and then
The majority of similarity of three channels is used as the final similarity of each
block. The ratio of same blocks in the input image and reference image is used
scenarios. The obtained results show the effectiveness of the proposed algorithm
systems suffer from different spoofing attacks like photograph-based and video-
using several scenarios. The obtained results show the effectiveness of the
A Page on a website:
National College of Science and
Technology 34
Amafel Building, Aguinaldo Highway, Dasmariñas City 4114
Engineering and Architecture Department
Real Time Face Recognition of Human Faces by using LBPH and Viola
Jones Algorithm
In our social life face is the primitive center for consideration, which plays
a vital task for identification and an emotion. Live Face Recognition has attained
accurate and fast results etc. Real time human Face recognition executes in two
levels, such as Face detection and Face recognition. For face detection we are
using viola-jones algorithm because of its high precision and high real time
recognition two categories are considered: training phase and evaluation phase.
In training phase, the algorithm is trained with the samples of the image to
be learned and in estimation phase, the test image is compared among all the
trained samples in the dataset. The facial features are extracted with the
detected faces from live stream by Local Binary Patterns Histogram (LBPH). By
using the LBPH, face recognition is finished using Euclidean distance classifier.
National College of Science and
Technology 35
Amafel Building, Aguinaldo Highway, Dasmariñas City 4114
Engineering and Architecture Department
85%-95%.
A Page on a Website:
on face recognition problem, which can recognize both front face and side face.
neighborhood gray median (MLBPH) is proposed. The gray value of the pixel is
replaced by the median value of its neighborhood sampling value, and then the
feature value is extracted by the sub blocks and the statistical histogram is
established to form the MLBPH feature dictionary, which is used to recognize the
human face identity compared with test image. Experiments are carried on
FERET standard face database and the creation of new face database, and the
rate.
on face recognition problem, which can recognize both front face and side face.
National College of Science and
Technology 36
Amafel Building, Aguinaldo Highway, Dasmariñas City 4114
Engineering and Architecture Department
neighborhood gray median (MLBPH) is proposed. The gray value of the pixel is
replaced by the median value of its neighborhood sampling value, and then the
feature value is extracted by the sub blocks and the statistical histogram is
established to form the MLBPH feature dictionary, which is used to recognize the
human face identity compared with test image. Experiments are carried on
FERET standard face database and the creation of new face database, and the
rate. This project employs the Local Binary Patterns Histogram (LBPH) algorithm
architecture to address the human face recognition in real time at the low level of
A Page on a Website:
CHAPTER 3
RESEARCH METHODOLOGY
Methods of Research
casting light on current issues and problems through a process of data collection
facial authentication. The proponents used applied research to develop new and
and processes which are indicated to the systems' development life cycle of the
study using Spiral Model, the registration flowchart and system flowchart of the
National College of Science and
Technology 38
Amafel Building, Aguinaldo Highway, Dasmariñas City 4114
Engineering and Architecture Department
proposed project shows the process of system. It also includes the GUI graphical
development that discussed the function of the materials in the project, software
development that discussed the software used for processing of bio metrics and
the evaluation instrument which shows the plans and procedures made by the
In this part of figure 3.1 the methodology shows the system development
life cycle used by the researchers in presenting the project to make the study
acceptable and functional. The proponents show the procedures involved in the
Borrowing System and guide the proponents on the the steps needed to make it
model and the waterfall model. The spiral model is favored for large, expensive,
and complicated projects. These are some reasons of the proponents in choose
National College of Science and
Technology 39
Amafel Building, Aguinaldo Highway, Dasmariñas City 4114
Engineering and Architecture Department
Spiral Model among the other models, using this model the proponents can
estimates budget and schedule. The project became more realistic as work
system into phases. Spiral Model is often chosen over Waterfall Model because
unlike Spiral Model, Waterfall approach does not define the process to go back
DESIGNING OF A SYSTEM
National College of Science and
Technology 40
Amafel Building, Aguinaldo Highway, Dasmariñas City 4114
Engineering and Architecture Department
Figure 3.1 Software Development Life Cycle for the Project Innovation of
Planning – The proponents first discussed the different ideas, process and
desired concept of each member regarding the project and to gather information
from different related sources that will help in making the system. Starting from
the name of the project, an applicable concept, logo design to layout design, the
Risk Analysis – The proponents discussed the possible problems that may
discussed thoroughly to conduct different solutions. The risk analysis for system
Engineering – After discussing the risk analysis, the proponents continue giving
suggestion on layout design that was appropriate for the project while getting
more information about the kind of algorithm to use for the computer programs
Here is the list of the proposed budget and materials during the
Monitor
2019
Task Jan Feb March April May
1 2 3 4 1 2 3 4 1 2 3 4 1 2 3 4 1 2 3 4
Project
Proposal
Researching
Analysis
Designing
Programming
Documentation
Testing
The table above (Table 3.2) The Gantt chart shows the time consumed
(in weeks) in developing the project. From third week of January to third week of
February the proponents started making project proposals, and end up with a
proposed project entitle “NCST Engineering Tools Borrowing System with Facial
Recognition”. During the second week of February until third week of April the
National College of Science and
Technology 43
Amafel Building, Aguinaldo Highway, Dasmariñas City 4114
Engineering and Architecture Department
proponents have done the research. Analyzing of the project was started last
week of February until second week of April. The proponents started to design
their actual project during the last week of March until last week of April.
Programming started from first week of March until last week of May. The
documentation of the project was started in the third week of March until last
week of April. And for the testing of the Project it was started in the second
attain the goals of the design. The processor comprised of Touch Screen Monitor
where the GUI display, Camera for the Facial Recognition and Thermal Printer
User:
National College of Science and
Technology 46
Amafel Building, Aguinaldo Highway, Dasmariñas City 4114
Engineering and Architecture Department
Admin:
National College of Science and
Technology 47
Amafel Building, Aguinaldo Highway, Dasmariñas City 4114
Engineering and Architecture Department
References
9. Ranganatha (2018). Image Training and LBPH Based Algorithm for Face
Tracking in Different Background Video Sequence retrieve from
https://www.ijcseonline.org
National College of Science and
Technology 55
Amafel Building, Aguinaldo Highway, Dasmariñas City 4114
Engineering and Architecture Department
10. Bismanos Jr. (2013). Local Area Network Wired and Wireless Simulator
retrieved from https://ejournals.ph