Saturday, May 25, 2019
Faculty Attendance System Using Automatic Image Processing Essay
As technology grows fast, certain advancements are being substantial nowadays and life is getting even better to await with. It makes every task as easy as possible and nothing seems too drop if gentlemans gentleman tasks are aided with technology. It bed be applied in any aspects of life. Computer technology would be the first on the list that provides spectacular potential for improving effectiveness and efficiency of the information arrangement. The use of computer has not become a major tool to simplify job and task. thither is no doubt that computer technology has had a great impact on society and alike brought many technical developments with it.It has brought many changes to the way we live as individual as well as members of societies and organizations. It has had major effects and changes on the economy, health, education, industry, agriculture and many other fields. The ability of computers in gathering, touch, presenting and sending big(p) amount of information h as had major changes in the way large organizations as well individuals organize their lives. Computers are at work, in schools and many other places. The human face plays an important role in our social interaction, conveying peoples identity.Using human face as a key to security, the biometry face recognition technology has received significant care in the past several years due to its potential for a wide mixing of applications in both law enforcement and non-law enforcement. As compared with other biometrics schemas using fingerprint/palm print and iris, face recognition has distinct advantages because of its non-contact process. Face images can be captured from a distance without touching the person being identified, and the identification does not require interacting with the person.In recent years, face recognition has attracted much attention and its research has rapidly expanded by not only engineers but also neuroscientists, since it has many potential applications in co mputer vision communication and semiautomatic access retard establishment. Especially, face spotting is an important part of face recognition as the first step of automatic face recognition.However, face detection is not straightforward because it has lots of variations of image appearance, such as pose variation (front, non-front), cclusion, image orientation, illuminating condition and nervus facial nerveis expression. With the continuous development and mature of science and technology, facial biometric recognition technology has become more sophisticated and perfect. As the worlds most cutting-edge biometric technology and image processing technology, facial biometric recognition technology will play a unique and irreplaceable role in todays public security prevent, gimmick fugitives, network security, financial security and many other areas.It is a milest whiz of development and progress of human society science and technology. It will be widely used in public security , aviation, ports, customs, banks, large enterprises, large-scale conferences, high-end clubs, important streets, docks and other places of security. It will bring revolutionary changes for safety defend and prevention of the current perplex domestic security situation. Face recognition serves the crime deterrent purpose because face images that have been recorded and archived can later help identify a person.Many citizens express concern that their cover is being compromised by the use of charge technologies by corporations and the state. Some fear that it could lead to a total surveillance society, with the government and other authorities having the ability to know the whereabouts and activities of all citizens around the clock. This knowledge has, is and could continue to be deployed to prevent the lawful exercise of rights of citizens to criticize those in office, specific government policies or corporate practices.Many centralized power structures with such surveillance cap abilities have abused their privileged access to maintain control of the political and economic apparatus and curtail populist reforms. Facial recognition can be used not just to identify an individual, but also to unearth other personal data associated with an individual such as other photos featuring the individual, blog posts, social networking profiles, Internet behavior, travel patterns, etc. all through with(predicate) facial features alone.Moreover, individuals have limited ability to avoid or thwart facial recognition tracking unless they hide their faces. This fundamentally changes the dynamic of day-to-day privacy by enabling any marketer, government agency, or random stranger to secretly collect the identities and associated personal information of any individual captured by the facial recognition system. Purpose and Description Nowadays, industry is experiencing many technological advancement and changes in methods of learning.With the rise of globalization, it is bec oming essential to find an easier and more effective system to help an organization or company. In spite of this matter, there are still business establishments and schools that use the old-fashioned way. In a certain way, one thing that is still in manual process is the recording of attendance. Face detection is a computer technology that determines the locations and sizes of human faces in arbitrary (digital) images.It detects facial features and ignores anything else, such as buildings, trees and bodies. Dealing with this matter, the proponents thought of an easy way to do the checking of attendance. This study entitled is intended to develop an attendance monitoring system to be used inside the school vicinity of Batangas State University JPLPC Campus for better management of employees. We come up with a computerized attendance-monitoring system using image processing. It serves as a timed log-in/ log-out system that is set up as a computerized database.This system maintains a d aily record of a facultys stretch and departure time from work. Aside from the records of time and date, our system features the name, position and the assigned number of each staff. So it also serves as an identification profile system. The system also protects the employees by providing the exact number of hours they worked, making it much more difficult for employers to cheat them out of their wages. This thesis features all important facts about our system as well as its importance.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.