Friday, October 11, 2019

Faculty Attendance System Using Automatic Image Processing Essay

As technology grows fast, certain advancements are being developed nowadays and life is getting even better to live with. It makes every task as easy as possible and nothing seems too tiring if human tasks are aided with technology. It can be applied in any aspects of life. Computer technology would be the first on the list that provides great potential for improving effectiveness and efficiency of the information system. The use of computer has not become a major tool to simplify job and task. There is no doubt that computer technology has had a great impact on society and also brought many technical developments with it. It has brought many changes to the way we live as individual as well as members of societies and organizations. It has had major effects and changes on the economy, health, education, industry, agriculture and many other fields. The ability of computers in gathering, processing, presenting and sending large amount of information has had major changes in the way large organizations as well individuals organize their lives. Computers are at work, in schools and many other places. The human face plays an important role in our social interaction, conveying people’s identity. Using human face as a key to security, the biometrics face recognition technology has received significant attention in the past several years due to its potential for a wide variety of applications in both law enforcement and non-law enforcement. As compared with other biometrics systems using fingerprint/palm print and iris, face recognition has distinct advantages because of its non-contact process. Face images can be captured from a distance without touching the person being identified, and the identification does not require interacting with the person. In recent years, face recognition has attracted much attention and its research has rapidly expanded by not only engineers but also neuroscientists, since it has many potential applications in computer vision communication and automatic access control system. Especially, face detection is an important part of face recognition as the first step of automatic face recognition. However, face detection is not straightforward because it has lots of variations of image appearance, such as pose variation (front, non-front), cclusion, image orientation, illuminating condition and facial expression. With the continuous development and progress of science and technology, facial biometric recognition technology has become more sophisticated and perfect. As the world’s most cutting-edge biometric technology and image processing technology, facial biometric recognition technology will play a unique and irreplaceable role in today’s public security prevent, arrest fugitives, network security, financial security and many other areas. It is a milestone of development and progress of human society science and technology. It will be widely used in public security, aviation, ports, customs, banks, large enterprises, large-scale conferences, high-end clubs, important streets, docks and other places of security. It will bring revolutionary changes for safety defend and prevention of the current complicated domestic security situation. Face recognition serves the crime deterrent purpose because face images that have been recorded and archived can later help identify a person. Many citizens express concern that their privacy is being compromised by the use of surveillance technologies by corporations and the state. Some fear that it could lead to a total surveillance society, with the government and other authorities having the ability to know the whereabouts and activities of all citizens around the clock. This knowledge has, is and could continue to be deployed to prevent the lawful exercise of rights of citizens to criticize those in office, specific government policies or corporate practices. Many centralized power structures with such surveillance capabilities have abused their privileged access to maintain control of the political and economic apparatus and curtail populist reforms. Facial recognition can be used not just to identify an individual, but also to unearth other personal data associated with an individual – such as other photos featuring the individual, blog posts, social networking profiles, Internet behavior, travel patterns, etc. – all through facial features alone. Moreover, individuals have limited ability to avoid or thwart facial recognition tracking unless they hide their faces. This fundamentally changes the dynamic of day-to-day privacy by enabling any marketer, government agency, or random stranger to secretly collect the identities and associated personal information of any individual captured by the facial recognition system. Purpose and Description Nowadays, industry is experiencing many technological advancement and changes in methods of learning. With the rise of globalization, it is becoming essential to find an easier and more effective system to help an organization or company. In spite of this matter, there are still business establishments and schools that use the old-fashioned way. In a certain way, one thing that is still in manual process is the recording of attendance. Face detection is a computer technology that determines the locations and sizes of human faces in arbitrary (digital) images. It detects facial features and ignores anything else, such as buildings, trees and bodies. Dealing with this matter, the proponents thought of an easy way to do the checking of attendance. This study entitled is intended to develop an attendance monitoring system to be used inside the school vicinity of Batangas State University JPLPC Campus for better management of employees. We come up with a computerized attendance-monitoring system using image processing. It serves as a timed log-in/ log-out system that is set up as a computerized database. This system maintains a daily record of a faculty’s arrival and departure time from work. Aside from the records of time and date, our system features the name, position and the assigned number of each staff. So it also serves as an identification profile system. The system also protects the employees by providing the exact number of hours they worked, making it much more difficult for employers to cheat them out of their wages. This thesis features all important facts about our system as well as its importance.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.