Final Thesis Jomar
Final Thesis Jomar
AVENSON P. TALADTAD
JOMAR BUENO
VELMORE L. BULAKLAK
November 2019
PAMANTASAN NG LUNGSOD NG MUNTINLUPA
TABLE OF CONTENT
Title Page
Approval Sheet
Acknowledgement
Executive Summary
Table of Content
List of Figures
List of Tables
CHAPTER
1. INTRODUCTION
Project Context
Purpose and Description
Objective of the Study
Scope and Limitation
3. METHODOLOGY
Requirement Analysis
Requirement Documentation
Design of Software, Systems, Product and/or Processes
Development and Testing
Implementation Plan
CHAPTER 1
INTRODUCTION
Project Context
Face recognition is a task so common to humans, that the individual does not
research in automated face recognition has been conducted since the 1960’s, it has
only recently caught the attention of the scientific community. Many face analysis
and face modeling techniques have progressed significantly in the last decade.
However, the reliability of face recognition schemes still poses great challenge to the
scientific community.
potential breach of security. In todays larger, more complex society it isn’t that
simple with all the growing electronic interactions. So it becomes even more
electronic verification was done either based on something the person had in their
The major problem is that these forms of electronic identification are not very
secure as they can be faked by hackers, maliciously given away, stolen or even lost.
identification. This is because such attributes like finger print, Iris or face of a person
PAMANTASAN NG LUNGSOD NG MUNTINLUPA
cannot be lost, given away, stolen or forged by hackers. Falsification of identity
These problems of modern society have triggered a real necessity for reliable,
user-friendly and widely acceptable control mechanisms for the identification and
verification of the individual. Biometric authentication and their template security are
increasing day by day over the past decade with challenging requirement in
demand for the replacement of old fashioned automatic personal identification tools
by new one. The old-fashioned automatic personal identification tools uses traditional
credible adequate to gratify the security Concern for person identification system.
some particular trait. Biometric Identification Systems are widely used for unique
as a form of identity access management and access control. So the use of biometrics
The Ang Dating Daan Locale of Alabang was started in 1998 with
approximate 100 members during that time they only manually taken the attendance
each of the members before the church service. It was easy to monitored the
attendance and determine the member who was been inactive in the church. The
workers would review the attendance and determined the inactive members. At the
PAMANTASAN NG LUNGSOD NG MUNTINLUPA
end of the month the workers of the locale will visit the inactive member and remind
them about their actions. Over the years, the population of the members of Ang
the inactive members becomes a challenge for the worker of Ang Dating Daan. In
2013 the automated Attendance monitoring system via RFID using a bar code with
ID was introduce to the locale of Alabang the member who has an ID from the
Central (the main office of their Church) were able to perform their attendance
automatically with ease but for the (provisionary) member were still using the manual
system as well as the visitor from the other locale. In manual process, both the
(provisionary) member and the visitor receive a piece of paper called "Katibayan" or
The RFID-based attendance system has been a great solution to cater the
January 2019 there were about 600+ active members in the church. The automate
population. Since then, the RFID-based attendance system has been used in locale of
alabang the institution relied on it. Over the time due to poor maintenance, the system
has slowed down and has gone crazy. In 2017, the programmer who took care of the
it usually does not work. For example when the barcode in a member's id is so
obscured that it cannot be read by the scanner or sensor the system can’t as well
PAMANTASAN NG LUNGSOD NG MUNTINLUPA
perform attendance monitoring for new members who does not have an ID yet from
the Central. The system does not have a user interface that can view report and sorted
it the way they need it. The workers had their hard times in retrieving and monitoring
each member's attendance, which is why the workers in the locale of the Alabang
more often.
There are many solutions to automate the attendance management system like thumb
based system, simple computerized attendance system, Iris scanner, but all these
systems have limitations overwork and security point of view. The develop system
uses the basic idea of image processing which is used in many security applications
The develop system which uses Facial recognition to capture and monitor
dashboard where a worker can view, modify, search and delete a member's data. The
system has an additional feature whereby workers can give reminders to inactive
The develop system will uses two step mechanisms. The first method will
detect the face from the real time environment and followed by the face recognition.
The first method is achieved by using Camera which is connected to Raspberry pi. It
PAMANTASAN NG LUNGSOD NG MUNTINLUPA
will captures the images of the members, Then the detected face is compared with the
stored data of every member. The member database is collected and stored into the pi
at the initial stage. The database includes name of the members, their images and
registered number. The raspberry pi is fixed at the front side of facility in such a way
that we can capture entire room. Thus with the help of this system, time will be saved
The develop system in which the member data is created in the organization
database, the photo will be uploaded into the database as well. First, it will detect the
faces from the live video streaming from the camera. Using suitable face recognition
algorithms, the face matching is done with the member when he enters into the
institution from the live video captured by the cameras. This step acts as first layer of
security for the sensitive places. If match of the face does not happen then alarm gets
will be able to cater both new and old member of the organization to improve the
Workers the develop system will be able to help the workers of locale of
Alabang to monitor the attendance as well as retrieving members data and making
reports.
Institution the develop system will be able to help the institution of Ang
Future Researcher this study will be able to help the future researcher as a
General Objectives
secure technique for personal authentication using facial recognition and also
attendance.
Specific Objectives
members.
c. This automated system will capture live feed from camera to record
attendance times.
d. This automated system will link the information captured by the feed
3. To test the functionality of the system using the Test Cases method, and
software characteristics.
The Scope of this system is to solve the issues encountered in the old
attendance system while reproducing a brand new innovative smart system that can
provide convenience to the institution. In this project, a smart device will be develop
which is capable of recognizing the identity of each individuals and eventually record
down the data into a database system. Apart from that, a GIU will be developed to
provide visual access to the information. The design system comprising of two
basically a camera application that will captures member faces and stores them in a
captured images (face marks the member register and then stores the results in a
database for future analysis). The system is able to send notification using SMS
technology. The system are capable of creating, modify user’s/member’s data. It also
locale only. The database of the attendance management system can hold up to 5000
individual’s information. The facial recognition process can only be done for 4
people at a time. The workers are the only personnel allowed to add, modify and
delete member’s data. The system will not be able to detect faces with barriers like
CHAPTER 2
REVIEW OF THE RELATED LITERATURE AND STUDIES
Technical Background
The Concept of image processing through python OpenCV platform has been
used for human identification through face detection. Human Identification means to
recognize a particular people through his unique structure like fingerprint, palm, and
systems for Raspberry PI; through this a user data has been stored in a particular
sequence and can be manipulated with Detection Window where a current image of
This mechanism is based on three steps, for the first we need to take dataset of
each person about 20 samples where an algorithm of face detection face.xml file is
used and is based on OpenCV. The second step of human identification is trainer,
which means we need to train our system and is converted that dataset into its
corresponding .YML file format. This YML file has been used on detector script and
is detected the respective face of user in real time when we run this detector file.
Through this detector window we can see real time picture along with corresponding
user information which has been linked with database and for an unknown person the
images of the member who are present. Raspberry pi takes those images as input
images and compares the input images with the existing image. This happens due to
PAMANTASAN NG LUNGSOD NG MUNTINLUPA
importing the open CV packages at the initial stage of the development of the
required by the administration and find the result. The result is displayed on the
monitor screen which is connected to the raspberry pi through the Ethernet cable or
The researcher Develop a dashboard that use jQuery and Bootstrap as front
end of the system to help the developer in creating a more beautiful and immersive
document, select DOM elements, create animations, handle events, and develop Ajax
top of the JavaScript library. This enables developers to create abstractions for low-
level interaction and animation, advanced effects and high-level, Themeable widgets.
The modular approach to the jQuery library allows the creation of powerful dynamic
and helps developers avoid many common security mistakes. The framework has
developed using Django can be upgraded with minimal cost, changes, and additions
and it make a lot of web development easier. Django framework is widely used as it
developers. It means we can find answers to the problems easily using Google.
PAMANTASAN NG LUNGSOD NG MUNTINLUPA
Related Literature
In the author proposed that different types of face detection for detecting faces
pattern for detecting face is nose, eyes, hair, ears and some time it based on tone of
skin. Face detection is detecting face based on location of face and presences of face
in images .Different types of detecting the face techniques they are Ada-Boost
Algorithm for Face Detection, Viola Jones Face Detection Algorithm, SMQT
Features and SNOW Classifier Method, Local Binary Pattern (LBP). Each has
The author proposed that recognition face using hog features and pca
The author shows that face recognition of facial of different person or student
recognition of student or workers. From this manual work is decrease by human and
The author proposed that capturing the images from camera or cc camera and
applying techniques face detection and recognition can decrease the manual work
from human and increase the security safety, taking the decision from this recognition
the use of facial recognition techniques for the purpose of student attendance and for
the further process this record of student can be used in exam related issues. [4]
attendance system for college students. In the most of collages lecturer take
PAMANTASAN NG LUNGSOD NG MUNTINLUPA
attendance by calling out the names and surnames of students and then marking them
or pass the attendance sheet to students and asking students to sign in attendance sheet.
This both practices have their drawbacks. In first case if strength of students is more,
checking this entire student by name and surname might take about several minutes.
In second case if student is absent then friends of absent students may write down
it comes to taking attendance. To come out from all these issues we put NFC tag into
service. Each tag has a unique ID, precluding the duplication of a tag. These NFC tag
are given to students when they registered in college. When student enter in class
rooms and touch or move these tag on lecturer mobile phone, NFC readers program
will read these tags, identify the students from the irrespective NFC tag and embedded
camera will capture the face of particular student then application send all the data to
college server and in server side validation program will check the data for validation
(compare new data with previous data which was already store in database) if valid
data found then program will update the database as marking attendance otherwise
emotion without using hardcoded arguments. The program is not perfect, mainly due
to the size of the dataset provided (relatively small) and the error of SVM. To improve
the program, more data need to be provided and classified, which will increase
accuracy and performance of the program. Other algorithms could also be tested to
see which classification methods work best with the dataset provided.
PAMANTASAN NG LUNGSOD NG MUNTINLUPA
The program just represents a tiny fraction in the Machine Learning field,
what its capability is. In the near future, Machine Learning will be one of the most
system using face detection and recognition. Manually taking attendance by teachers
because a lot of manipulation and a lot of confusion at times the automated system for
attendance designed by us prevent the extra proxies and manipulation of the data. It
also saves the time spent on counting the students and taking attendance, which in
turn can be used for betterment of students. Our Attendance system compromises of
four steps i.e. creating a database, taking a group photo of class, face segmentation,
based face recognition system using conventional face detection. This paper aims at
taking face recognition to a level in which the system can replace the use of
passwords and RF I-Cards for access to high security systems and buildings. With the
use of the Raspberry Pi kit, we aim at making the system cost effective and easy to
use, with high performance. This paper details the design and development of IOT
based security surveillance system in buildings using Raspberry Pi single board with
Upon detecting the face, the controller enables the camera for capturing the
event, alerts the user by placing the live video of that event on webpage that is
and transmission[9].
for human interpretation and analysis. Typical applications include; noise filtering,
In this, the interest is on the procedures for extraction of image information suitable
for computer processing. Typical applications include; Industrial machine vision for
product assembly and inspection. Automated target detection and tracking. Finger
print recognition. Machine processing of aerial and satellite imagery for weather
prediction and crop assessment. Facial detection and recognition falls within the
Related Studies
face annotation is method to identify human faces from image and assign appropriate
human name. Face detection and face recognition are essential tasks in face
annotation. An author also discusses the phases of the automatic face annotation and
Platform. The system is implemented on the credit card size Raspberry Pi board with
used for Image processing operation. This technique is also based on OTP (one time
watchman. [12]
space, facial feature extraction and variance estimation. It can be applied in face
demonstrate the effectiveness of this system and its ability to recognize a variety of
conditions. [13]
Face Detection, This System can detect the human fundamental personality for the
same input image data with the training data and one way to know the human
fundamental personality is based on test, and one kind of test is Graph test
(handwriting test). In this study has been conducted detection of the human
fundamental personality using combination of some face features: the eyes, lips, and
nose (without test). Those features are obtained from facial image. [14]
descriptor using the OpenCV library coded with the High-level programming
language Python, booted with the help of Raspberry Pi microcontroller fitted with a
demonstrated. PIR motion sensor has been used to detect motion and a pi camera can
three additional classifiers. Author has been use Haar cascade algorithm combined
with three additional weak classifiers based on skin hue histogram matching, eyes
A system for Human face detection from images, based on skin color, Face
detection is necessary in many applications, like those for face recognition, face
Art. This wheel chair is highly applicable to disable person to execute their regular
task. This system has been designed using Raspberry Pi and IR Camera Module.
OpenCV will be used for image processing and Python is used for programming the
system which any type of public security is using Living body detection or spying,
Also it can be used in Attendance system of the class, Real time face detection and
face detection from specific images, i.e. object recognition, was carried out. The
analysis revealed that the present system shows excellent performance efficiency. [19]
individuals on the basis of intensities of pixels in the snap shots. The ARM Processor
module is used for displaying Number of Presenters and the people present. The
camera will be connected to the ARM. The student or employees database is collected.
The database includes name of the students/employees, there images. This webcam
PAMANTASAN NG LUNGSOD NG MUNTINLUPA
module will be installed at the front side of class in such a way that it can capture
entire class or in front of a main office door. Thus with the help of this system, time
will be saved and it will be very much convenient to record attendance. [20]
Related System
This figure show using face detection and recognition technology, a time
period is settled for taking the attendance and after completion of time period
attendance will directly stores into storage device mechanically without any human
intervention. A message will send to absent student parent mobile using GSM
technology. This attendance will be uploaded into web server using Ethernet. This
Camera is interfaced to one USB port of raspberry pi 2. Eigen faces algorithm is used
Eigen faces algorithm is less time taken and high effective than other
algorithms like viola-Jones algorithm etc. the attendance will directly stores in storage
device like pen drive that is connected to one of the USB port of raspberry pi 2 [22].
PAMANTASAN NG LUNGSOD NG MUNTINLUPA
The figure 2 shows that Image processing based Student Attendance System
using Raspberry pi using Open CV tool as software for image processing and
attendance is provided to the students, The system can track the attendance of the
students by using the language python and Open CV software, which is very easy to
install and is open source software and can be used in real time application in a quick
manner. The project has shown the tracking of the students in the class by using
camera in the system. This proposed system reduces the possibilities of proxy
attendance of the students, who were not present in the class and reduces the time. [23]
PAMANTASAN NG LUNGSOD NG MUNTINLUPA
Figure 3 shows efficient human Identification through face detection has been
carried out with the use of PHPmyadmin and SQLite Studio database for storing
relevant information. The performance of the system is based on three steps which are
datasets, trainer and detector python script. An algorithm that has been used for image
processing is OpenCV and especially for face detection “Haar cascade frontal face”
has been used. As we talk about future modification of this project, it will be used in
high security system and face detection based attendance system. Also we can
The figure 4 show the graphic interface and capturing the images from camera
or cc camera and applying techniques face detection and recognition can decrease the
manual work from human and increase the security safety, taking the decision from
this recognition result. In this system implemented an attendance system for a lecture,
attendance. [25]
PAMANTASAN NG LUNGSOD NG MUNTINLUPA
DEFINITION OF TERMS
Technical terms
Created by Guido van Rossum and first released in 1991, Python's design
whitespace.
Garage then Itseez. The library is cross-platform and free for use under the
Raspberry Pi 3 Model B - is a tiny credit card size computer. Just add a keyboard,
Distribution and you'll have a fully fledged computer that can run applications
YAML - stands for "YAML Ain't Markup Language" and it is used extensively in
Grav for its configuration files, blueprints, and also in page settings. YAML is
structured data format. ... At its core, a YAML file is used to describe data.
SQLite3 - is compact free databases you can use easily create and use a database.
PAMANTASAN NG LUNGSOD NG MUNTINLUPA
Facial Recognition System - is a technology capable of identifying or verifying a
GUI - graphical user interface is a form of user interface that allows users to interact
with electronic devices through graphical icons and visual indicators such as
they are often developed using formal design and modeling techniques.
Python library - is a collection of functions and methods that allows you to perform
many actions without writing your code. For example, the Python imaging
library (PIL).is one of the core libraries for image manipulation in Python.
Worker- a personnel who are facilitating the Institution They are the one who
handled the attendance Systems and other process and services related to the
institution.
PAMANTASAN NG LUNGSOD NG MUNTINLUPA
Operational Terms
unfamiliar faces and decide whether or not they show the same person.
the surface of a face, such as the contour of the eye sockets, nose, and chin.
images, set the cropping parameters and let your computer do the work.
subject's.
employees within their working hours and to prepare materials for processing
wages.
PAMANTASAN NG LUNGSOD NG MUNTINLUPA
CHAPTER 3
METHODOLOGY
This chapter provides an outline of the research methodology that will answer
the questions of the study and contains the research design, validation of data, and
instruments used in collecting data. This is also contains charts and templates that
Requirement Analysis
This topic discussed the requirements needed for developing the project. This
This figure shows the process of the existing RFID based Attendance
monitoring system. It shows that the worker manages the system and provides report.
PAMANTASAN NG LUNGSOD NG MUNTINLUPA
The Members enters information and perform attendance using their barcode Id. The
system authenticates the members ID and save the attendance log in the database.
This figure shows the member’s registration or enrollment to the system. The
worker register’s the member’s data to the system. The data are saved in the database.
It also shows how the attendance process are done, the user tap their Barcode ID, the
system will authenticate it by matching the id in the database and the entered id if
successfully match the system will mark the attendance and save it to the attendance
table.
PAMANTASAN NG LUNGSOD NG MUNTINLUPA
Requirement Documentation
in context, and describes what the finished project will be like. Requirement includes
description of system properties, specification of how the system should work, and
statements of what a system should do rather than how it should do it. Requirements
come from end users, and sometimes from developers. Requirements documents
usually include user, system and interface requirements; other classes of requirements
The figures show the contextual level of the developed Attendance monitoring
system using facial recognition. The worker manages the system and the member’s
perform their attendance using facial recognition. The system sends SMS notification
This figure shows the develop attendance system using facial recognition,
member’s needs registration or enrollment to the system. The worker register’s the
member’s data to the system. The data are saved in the database. It also shows how
the attendance process are done, the user can log in using their face as ID , the system
will authenticate it by matching the face in the database and if the entered face id
successfully match the system will mark the attendance and save it to the attendance
table.
PAMANTASAN NG LUNGSOD NG MUNTINLUPA
This figure shows the system are able to send notification through SMS
technology to the inactive members. The workers will able to determine inactive
member and are able to produce report. Sorting of member’s information are now
family or basis. It is based on the Haar Wavelet technique to analyze pixels in the
image into squares by function. This uses machine learning techniques to get a high
degree of accuracy from what is called “training data”. This uses “integral image”
concepts to compute the “features” detected. Haar Cascades use the Adaboost learning
algorithm which selects a small number of important features from a large set to give
from a lot of positive and negative images. This process in the algorithm is feature
extraction.
In feature extraction, the algorithm uses training data to best identify features that it
detection
Face Detection and Face Recognition. Face detection is about locating, while face
does is create a rectangle with coordinates (x,y,w,h) around the face detected in the
image. This contains code parameters that are the most important to consider.
ScaleFactor: The value indicates how much the image size is reduced at each
image scale. A lower value uses a smaller step for downscaling. This allows the
algorithm to detect the face. It has a value of x.y, where x and y are arbitrary
candidate rectangle should have. A higher value results in less detections but it
PAMANTASAN NG LUNGSOD NG MUNTINLUPA
detects higher quality in an image. You can use a value of X that specifies a
finite number.
minSize: The minimum object size. By default it is (30,30). The smaller the
face in the image, it is best to adjust the minSize value lower. When a face is
detected, a green rectangle will be generated around the face. A viewer window
Local Binary Pattern (LBP) is a simple yet very efficient texture operator
which labels the pixels of an image by thresholding the neighborhood of each pixel
and considers the result as a binary number. It was first described in 1994 (LBP) and
has since been found to be a powerful feature for texture classification. It has further
been determined that when LBP is combined with histograms of oriented gradients
datasets. Using the LBP combined with histograms we can represent the face images
Step-by-Step
Now that we know a little more about face recognition and the LBPH, let’s go further
Radius: the radius is used to build the circular local binary pattern and represents
Keep in mind: the more sample points you include, the higher the computational
Grid X: the number of cells in the horizontal direction. The more cells, the finer
the grid, the higher the dimensionality of the resulting feature vector. It is usually
set to 8.
Grid Y: the number of cells in the vertical direction. The more cells, the finer the
grid, the higher the dimensionality of the resulting feature vector. It is usually set
to 8.
2. Training the Algorithm: First, we need to train the algorithm. To do so, we need to
use a dataset with the facial images of the people we want to recognize. We need to
also set an ID (it may be a number or the name of the person) for each image, so the
algorithm will use this information to recognize an input image and give you an output.
Images of the same person must have the same ID. With the training set already
3. Applying the LBP operation: The first computational step of the LBPH is to create
an intermediate image that describes the original image in a better way, by highlighting
the facial characteristics. To do so, the algorithm uses a concept of a sliding window,
Based on the image above, let’s break it into several small steps so we can understand
it easily:
It can also be represented as a 3x3 matrix containing the intensity of each pixel
(0~255).
Then, we need to take the central value of the matrix to be used as the threshold.
This value will be used to define the new values from the 8 neighbors.
For each neighbor of the central value (threshold), we set a new binary value. We
set 1 for values equal or higher than the threshold and 0 for values lower than the
threshold.
Now, the matrix will contain only binary values (ignoring the central value). We
need to concatenate each binary value from each position from the matrix line by
PAMANTASAN NG LUNGSOD NG MUNTINLUPA
line into a new binary value (e.g. 10001101). Note: some authors use other
approaches to concatenate the binary values (e.g. clockwise direction), but the
Then, we convert this binary value to a decimal value and set it to the central
value of the matrix, which is actually a pixel from the original image.
At the end of this procedure (LBP procedure), we have a new image which
Note: The LBP procedure was expanded to use a different number of radius and
It can be done by using bilinear interpolation. If some data point is between the
pixels, it uses the values from the 4 nearest pixels (2x2) to estimate the value of the
can use the Grid X and Grid Y parameters to divide the image into multiple grids, as
Based on the image above, we can extract the histogram of each region as follows:
As we have an image in grayscale, each histogram (from each grid) will contain
only 256 positions (0~255) representing the occurrences of each pixel intensity.
in the final histogram. The final histogram represents the characteristics of the
5. Performing the face recognition: In this step, the algorithm is already trained.
Each histogram created is used to represent each image from the training dataset. So,
PAMANTASAN NG LUNGSOD NG MUNTINLUPA
given an input image, we perform the steps again for this new image and create a
So to find the image that matches the input image we just need to compare two
We can use various approaches to compare the histograms (calculate the distance
value, etc. In this example, we can use the Euclidean distance (which is quite
Figure 15: Formula can use to calculate distance between two Histogram
So the algorithm output is the ID from the image with the closest histogram. The
algorithm should also return the calculated distance, which can be used as a
lower confidences are better because it means the distance between the two
histograms is closer.
We can then use a threshold and the ‘confidence’ to automatically estimate if the
algorithm has correctly recognized the image. We can assume that the algorithm
defined.[28
PAMANTASAN NG LUNGSOD NG MUNTINLUPA
Design of Software, Systems, Product and/ or Processes
literature, studies and insights taken from them, a conceptual model was developed as
shown below.
Software Requirements
1. Linux OS
2. OpenCV libraries
3. SQLite3
Evaluation
4. Bootstrap
inputs for the proposed system states the necessary requirements for the system
The figure illustrates that the web camera will detect the user face Id and using
the Raspberry Pi it will compare the Face Id detected to the exiting face id stored in
database. When the Raspberry Pi locates the exact face id it will recognize the user.
The system will saved the date and time as attendance log of the user. The Admin will
be able to manage the system such as viewing of records and Attendance log, adding
From the Figure 18 power supply is given to the raspberry pi which is the
heart of the proposed system. Pi camera is connected to the raspberry pi camera slot.
Camera captures the images of the students who are present in the class. Raspberry pi
takes those images as input images and compares the input images with the existing
image. This happens due to importing the open CV packages at the initial stage of the
development of the system. Admin tracks the attendance of the students periodically
or whenever required by the administration and finds the result. The result is
displayed on the monitor screen which is connected to the raspberry pi through the
that uses minimal planning in favor of rapid prototyping. Each phase of the
development is elaborated on this part of the study and discusses how the project was
In this phase, the researchers gather information about the problem of the
organization. The proponents and the faculty discuss and agreed on the need of the
project, its scope, constraints and system requirement. Data were also collected
through online research in the internet for the proper content of the system. The
researcher also discussed the components on things that give solutions to the problem.
In this phase, the proponents design the system using Python. The target
user(s) is the Member’s of Ang Dating Daan Alabang Coordinating Center. The
developer design the System for the prefer target user(s) and make it user-friendly so
PAMANTASAN NG LUNGSOD NG MUNTINLUPA
that won’t have hard time accessing it. However, the proponents are still working on
Phase 3: Construction
This phase focuses on the application and development of the system. The
developers construct the system based on python. Also in this phase the developers
also develop a prototype needed for the Attendance monitoring system with the use of
Phase 4: Cut-over
In this phase, the system will tested for actual operation by users to
authenticate if the program and prototype meets the requirement of the users and to
validate as well if the programmer had satisfied the objective of the researcher. The
introduce to the Ang Dating Daan Alabang chapter for testing and evaluation of the
Testing Procedures
identify the possible errors and bugs that will appear on the system. Although, it did
not generally remove all the errors or bugs, but it at least helped the proponents
correct them and prevent them from reappearing in the future. The system features
were tested in a specified order to make sure that the functionality of the system was
meet and properly performs. The overall testing time is reduced in the RAD Prototype
model as the prototypes are independently tested during every iteration. However, the
data flow and the interfaces between all the components need to be thoroughly tested
PAMANTASAN NG LUNGSOD NG MUNTINLUPA
with complete test coverage. Since most of the programming components have
Table 1
Testing Procedures
Respondents of the study were individual users of the system such as the 10
shown in Table 2. The proponents used the Arithmetic mean to determine the average
responses of the Five option in each item, namely, 5(Strongly Agree), 4(Agree),
software characteristics were computed. These computations were used to derive the
Table 2
Lickert Scale
Figure 20.1 Isometric Diagram of the proposed prototype for the Attendance
Monitoring system
PAMANTASAN NG LUNGSOD NG MUNTINLUPA
Figure 20.2 Illustration Diagram of the proposed prototype for the Attendance
Monitoring system
PAMANTASAN NG LUNGSOD NG MUNTINLUPA
IMPLEMENTATION PLAN
Recognition using Raspberry Pi” will be sent to Ang Dating Daan Alabang Chapter
right away after the revision to present it once more to the expected users. If the
organization wants to adopt the system, the researchers will hand over the system
together with its documentation. It will serve as a guide to the administration who will
researchers is no longer responsible for its update and maintenance. If the system will
be implemented, the researchers will conduct several strategies. Those strategies are
presented below.
Table 3
Implementation Plan of the Develop system
CHAPTER 4
capabilities and limitations and project evaluation of the study will be presented.
Project Description
managing and handling their member’s information, monitor each of its status.
Record keeping and operations like reporting and monitoring members attendance
design that features the initials of the title itself to represent the main focus of the
PAMANTASAN NG LUNGSOD NG MUNTINLUPA
system which is the facial recognition. The Designer use only minimal color pallet to
Figure displays the home page and system’s dashboard. The homepage ia the
parent form of the dashboard. The home page contains the following buttons which
1. Attendance
2. View members
3. Add members
4. Members Database.
Figure displays the login form of the system. The login form shows a simple white
Figure displays the record page. It contains the attendance detail of the members. This
feature can help the user search member’s record without refiguring the database.
PAMANTASAN NG LUNGSOD NG MUNTINLUPA
Figure a displays the member registry. It serves as their control panel of the database
and can do simple CRUD database operation. In addition to its feature is the print in
feature of the system where the user can choose when printing in any way the users
desire . .
Formatted: Left
Formatted: Left
PAMANTASAN NG LUNGSOD NG MUNTINLUPA
Figure 28 Attendance Feature
This Figure Show the attendance feature of the system. It has two option the Face Formatted: Left, Indent: First line: 0.3"
Recognition and Barcode Scanner. Although the Barcode System is still under
development.
Formatted: Centered
Formatted: Left
Formatted: Font: Not Bold, Italic
Formatted: Left
PAMANTASAN NG LUNGSOD NG MUNTINLUPA
Figure 30 Authorization Access Control Formatted: Font: Not Italic
The system are able to grant authorization or access to the system. Formatted: Centered
This figure shows the actual SMS message sent by the system to the inactive member. Formatted: Left
Formatted: Font: Not Bold
Attendance Monitoring System with Facial Recognition using Raspberry Pi for Ang
Capabilities
1. The system can perform basic CRUD database management functions. The
addition the system also offers printing options for report documentation.
4. The Add new member’s database can be managed easily and updated real-
time.
5. The Member Records module provides a clear and less complex view of
6. The System can send notification through SMS notification to the inactive
members.
7. The system can perform Attendance through Facial recognition and barcode
Limitations
to function.
2. The system can only operate in windows and linux platforms with higher or
latest version.
and statistics.
PAMANTASAN NG LUNGSOD NG MUNTINLUPA
5. The system process is only limited to attendance, view member, , add
underwent actual testing and evaluation process with IT professionals and experts,
Project Evaluation
The developed system underwent actual testing and evaluation process. The
evaluation process was with the accordance of ISO/IEC 25010 2011. The evaluation
instrument provides a rating to scale the criteria for the prototype and software
materials, where five (5) is the highest and one (1) is the lowest. It suggests a software
Testing results as shown in following tables were test conducted by forty seven (47)
evaluators, fifteen (15) actual users including the Workers and Church member. (25)
students with subjects related to software development and seven (7) IT experts in the
and management office. The system was also evaluated if it meets the project
PAMANTASAN NG LUNGSOD NG MUNTINLUPA
objectives. The system's final prototype was evaluated by the evaluators hence some
changes and improvements are done with the final system output. The testing was
conducted in two cycles for each module during the system development. The testing
was done in two operating system, one in Linux and the other on Windows 10. The
system was subjected to 9 test cases to assess the functionality of each module. The
sample test cases with corresponding results for both cycles are presented in Table 4
and 5.
Table 7 shows the evaluation of the respondents of the study including users Formatted: Indent: First line: 0.5"
an users and five (3) students. The comments and suggestion provided and were noted
Table 7
Summary of Evaluation Results by the Users
Usability Agree
4.45
table 4 was 4.38 and rated as "Agree". The following area of evaluation were on
functional suitability which was scored 4.29 and was rated "Agree", another is on the
area of Performance Efficiency which was scored 4.45 and was rated "Agree", the
area of Usability was 4.68 and was rated " Strongly Agree" and the last area was the
Table 8 shows the evaluation of the respondents of the study including ten
users in the same area of the system. The comments and suggestion provided by the
Formatted: Left
Formatted: Left
Table 8
Summary of Evaluation Results by the IT Expert
The summary of the overall mean score evaluation by the IT expert as shown
in table 6 was 4.68 and was rated " Strongly Agree". The following area of evaluation
were on Functional Suitability which was scored 4.71 and was rated " Strongly
Agree", on the area of Performance Efficiency which was scored 4.76 and was rated
"Strongly Agree", Usability is another area which was scored 4.64 and was rated
""Strongly Agree"", Reliability was also evaluated and gain a score of 4.36 and was
rated "Agree", another area is Security which scored 4.74 and was rated ""Strongly
Agree"", on the part of Maintainability it was scored by the valuator 4.86 and was
rated ""Strongly Agree"" and the last part was the portability which was scored 4.67
Table 9 illustrates the over-all mean both of actual users and IT Experts Formatted: Indent: First line: 0.5"
combined.
Table 9
Summary of Over-all Mean Evaluation Results
Experts combined.
The summary of the overall mean score evaluation by the respondents as Formatted: Indent: First line: 0.5", Space Before: 12 pt
shown in tableb 6 was 4.63 and was rated "Strongly Agree". The following area of
evaluation were on Functional Suitability which was scored 4.52 and was rated
"Strongly Agree ", on the area of Performance Efficiency which was scored 4.52 and
was rated " Strongly Agree ". Usability is another area which was scored 4.54 and was
rated " Strongly Agree ", Reliability was also evaluated and pain a score of 4.52 and
was rated " Strongly Agree ", another area is Security which scored 4.74 and was
rated " Strongly Agree ", on the part of Me on the part of Maintainability it was
scored by the evaluator 4.86 and was rated " Strongly Agree " and the last part was
the portability which was scored 4.67 and was rated " Strongly Agree".
PAMANTASAN NG LUNGSOD NG MUNTINLUPA
Formatted: Left
Formatted: Centered
PAMANTASAN NG LUNGSOD NG MUNTINLUPA
CHAPTER 5
This chapter presents the summary of findings in the developed system, test
Summary of Findings
Pi for Ang Dating Daan Coordinating Center Alabang is found out to be useful when
the system more complex compared to using Microsoft excel, the system still got a
high rating value. The dashboard that displays the data statistics makes it more useful
and understandable to the actual users. In addition to it, they find the sorting options
more useful in retrieving data from the registry. The overall weighted average mean
“Strongly Agree”.
The proponents agreed that the system needs some improvement in its
features such as forms. The system controls should not be complex for users to use.
The experts also rated the developed system as easy to use based on its easy to
understand and user friendly graphic user interface. The small thought on the (UX)
user experience was also commended. Although its maintainability was not good
enough, the respondents expects that the proponent must improve its maintainability
when the development and implementation of the system is done. For actual users, the
developed system was rated 'Agree with the average weighted mean score of 4.45
PAMANTASAN NG LUNGSOD NG MUNTINLUPA
rated as Strongly Agree. The proponent agreed that the developed system is a great
help for the beneficiary's needs and it also meets the project objectives and
requirements.
The overall weighted mean of the developed system is 4.63 and rated as "
Strongly Agree”, The proponents found out that the developed system is can be
described as a great step for their Church automation however, the users'
demographics who evaluated the system are ranging from 18-40 years old and they
system thoroughly. The problems were answered by the project through giving the
church a digital analysis of the data and information. The developed system acts and
With the data and information that the system can produced reports, and able
to notify inactive members through SMS notification integrated in the system as well
Conclusion
The developers used the input of users and IT Experts to broaden the
Attendance Monitoring System with Facial Recognition using Raspberry Pi for Ang
The following conclusions were derived based on the concerns stated in the
objectives of the study a of the study and results of the evaluation conducted
PAMANTASAN NG LUNGSOD NG MUNTINLUPA
1. That “Development of an Attendance Monitoring System with Facial Recognition
using Raspberry Pi for Ang Dating Daan Coordinating Center Alabang " was design
b. That the automated system can create, modify, search and delete
member’s information.
c. That the system can capture live feed from camera to record
attendance times.
d. That automated system can link the information captured by the feed
notification.
f. That the automated system are able to produce reports for monitoring
g. That the system addressed all the beneficiary's concerns and complied
with the given project specifications during the planning period of the system
development
2. That the proponents design the system in compliance to the beneficiary’s requests
3. That the developed system has been successfully tested for its functional suitability,
portability by IT Experts and tested by the actual users on the area of functionality,
data can be used as a guide in decision making for the agency. The system can only
5. That the developed system were evaluated by the IT experts w valuated by the IT
experts with an overall mean score of 3.97. The developed system was rated "Agree"
and evaluated by the actual users with an overall mean score of 3.87 and was rated
"Agree from the evaluation prepared and adopted from ISO 25010:2011. 0.07 And
6. The developed system is ready for implementation upon the request agreement of
Recommendation
After the evaluation and testing procedures done by IT experts and actual
users and based on the results of the study, some recommendations are cited as
follows:
1. That the development of the system should also aimed for the longevity of use of
the system and comply with the current and future situations of the beneficiary
design preference of users and needs added information to pat the interest of future
users.
PAMANTASAN NG LUNGSOD NG MUNTINLUPA
3. That the developed system should be easy to use by both current and future users to
4. That the developed system is can be subjected to changes and the future researcher
can insert additional functions and improvements to the actual developed system.
REFERENCES
PAMANTASAN NG LUNGSOD NG MUNTINLUPA
[1]A Study of Various Face Detection Methods , Ms.Varsha Gupta1 , Mr. Dipesh
Sharma2,ijarccevol.3https://www.ijarcce.com/upload/2014/may/IJARCCE7G
%20%20a%20varsha%20A%20Study%20of%20Various%20Face.pdf
[2] Face Recognition Based on HOG and Fast PCA Algorithm Xiang-Yu Li(&) and
Zhen-Xian Lin
[3] Attendance System Using Face Recognition and Class Monitoring System,
ArunKatara1,Mr.Sudesh2,V.Kolhe3http://www.ijritcc.org/download/browse/V
olume_5_Issues/February_17_Volume_5_Issue_2/1489565866_15-
032017.pdf
[4] International Research Journal of Engineering and Technology (IRJET) e-ISSN:
2395-0056Volume: 05 Issue: 04 | Apr-2018 www.irjet.net p-ISSN: 2395-0072
[5] International Journal of Advanced Research in Computer and Communication
EngineeringVol. 4, Issue 2, February 20150
[6]https://www.google.com/url?sa=t&source=web&rct=j&url=https://www.theseus.fi/
bitstream/10024/114912/1/Minh%2BNguyen%2B-
%2Bthesis_final.pdf&ved=2ahUKEwiBzPPZjqfiAhWFdHAKHV7YD0IQFjA
BegQICRAF&usg=AOvVaw3pqnmAvkZ5hZ9A3T4mSM9L
[7] ISSN: 2350-0328International Journal of Advanced Research in Science,
Engineering and TechnologyVol. 4, Issue 5 , May 2017
[8] International Research Journal of Engineering and Technology (IRJET) e-ISSN:
2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-
0072
[11] Twisha Patel and Bhumika Shah, “A Survey on Facial Feature Extraction
Techniquesfor Automatic Face Annotation”, IEEE International Conference
on Innovative Mechanisms for Industry Applications (ICIMIA 2017),
Bangalore, India.
[12] Jignesh J. Patoliya and Miral M. Desai, “Face Detection based ATM Security
System using Embedded Linux Platform”, IEEE 2017 2nd International
Conference for Convergence in Technology (I2CT),Mumbai, India.
[13] Mohamed Heshmat, Walaa M. Abd-Elhafiez, MohebGirgis and SehamElaw,
“Face Identification System in Video”, IEEE 2016 11th International
Conference onComputer Engineering & Systems (ICCES), Cairo, Egypt.
[14] Ardinintya Diva Setyadi, Tri Harsono and SigitWasista, “Human Character
Recognition Application Based on Facial Feature Using Face Detection”,
IEEE 2015 International Electronics Symposium (IES), Surabaya, Indonesia.
[15] ShubhamMathur, Balaji Subramanian, Sanyam Jain and KajalChoudhary,
“Human Detector and Counter Using Raspberry Pi Microcontroller”, IEEE
International Conference on Innovations in Power and Advanced Computing
Technologies i-PACT2017, Vellore, India.
PAMANTASAN NG LUNGSOD NG MUNTINLUPA
[16] Li Cuimei, Qi Zhiliang, Jia Nan and Wu Jianhua, “Human face detection
algorithm via Haar cascade classifier combined with three additional
classifiers”, 2017 IEEE 13th International Conference on Electronic
Measurement & Instruments ICEMI’2017,Yangzhou, China.
[17] Hesham A. alabbasi and Floricamoldoveanu, “Human face detection from
images, based on skin color”, International Conference on System
Theory,Control and Computing, Sinaia, Romania,October 17-19, 2014.
[18]Jatin Sharma, ChandanChakraborty, Anbarasu M andShanmugasundaram M, “Iris
Movement Based Wheel Chair Control Using Raspberry Pi - A State of Art”,
International Conference on Innovations in Power and Advanced Computing
Technologies i-PACT2017, Vellore, India.
[19] International Conference on Science and Engineering for Sustainable
Development (ICSESD-2017) (www.jit.org.in)International Journal of
Advanced Engineering, Management and Science (IJAEMS) Special Issue-
1https://dx.doi.org/10.24001/icsesd2017.50 ISSN : 2454-
1311www.ijaems.com Page | 198
[20]https://www.stewright.me/2012/09/tutorial-install-phpmyadmin-on-your
raspberry-pi/
[21]
[22]
[23]
[24]
[25]
[26]
[27]
[28]
PAMANTASAN NG LUNGSOD NG MUNTINLUPA