0% found this document useful (0 votes)
111 views10 pages

Face Recognition Based Automated Attendance Management System

Uploaded by

Shilpa Reddy
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
111 views10 pages

Face Recognition Based Automated Attendance Management System

Uploaded by

Shilpa Reddy
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 10

See discussions, stats, and author profiles for this publication at: https://www.researchgate.

net/publication/358722010

Face Recognition Based Automated Attendance Management System

Article  in  International Journal of Scientific Research in Science and Technology · February 2022


DOI: 10.32628/IJSRST229147

CITATIONS READS

3 2,334

5 authors, including:

Dr. Yusuf Perwej Neha Kulshrestha


Ambalika Institute of Management & Technology Ambalika Institute of Management & Technology
82 PUBLICATIONS   849 CITATIONS    4 PUBLICATIONS   5 CITATIONS   

SEE PROFILE SEE PROFILE

Some of the authors of this publication are also working on these related projects:

An Experiential Study of the Big Data View project

Developing an Intelligent System for Medical Diagnosis View project

All content following this page was uploaded by Dr. Yusuf Perwej on 19 February 2022.

The user has requested enhancement of the downloaded file.


International Journal of Scientific Research in Science and Technology
Print ISSN: 2395-6011 | Online ISSN: 2395-602X (www.ijsrst.com)
doi : https://doi.org/10.32628/IJSRST229147

Face Recognition Based Automated Attendance


Management System
Aparna Trivedi*1, Chandan Mani Tripathi2, Dr. Yusuf Perwej3, Ashish Kumar Srivastava4, Neha Kulshrestha5
1* B.Tech Scholar, Computer Science & Engineering, Ambalika Institute of Management & Technology,
Lucknow, India 2Assistant Professor, Department of Computer Science & Engineering, Ambalika Institute of
Management & Technology, Lucknow , India
3 Professor, Department of Computer Science & Engineering, Ambalika Institute of Management and
Technology, Lucknow, India
4Assistant Professor, Department of Computer Science & Engineering, Ambalika Institute of Management &
Technology, Lucknow, India
5Assistant Professor, Department of Computer Science & Engineering, Ambalika Institute of Management &
Technology, Lucknow, India

ABSTRACT
At the beginning and end of each session, attendance is an important aspect of
Article Info the daily classroom evaluation. When using traditional methods such as calling
Volume 9, Issue 1 out roll calls or taking a student's signature, managing attendance can be a
Page Number : 261-268 time-consuming task. The teacher normally checks it, although it's possible
that a teacher will miss someone or some students' answers many times. Face
Publication Issue recognition-based attendance system is a solution to the problem of
January-February-2022 recognizing faces for the purpose of collecting attendance by utilizing face
recognition technology based on high-definition monitor video and other
Article History information technology. Instead of depending on time-consuming approaches,
Accepted : 08 Feb 2022 we present a real-time Face Recognition System for tracking student
Published : 17 Feb 2022 attendance in class in this work. The suggested method included identifying
human faces from a webcam using the Viola-Jones technique, resizing the
identified face to the desired size, and then processing the resized face using a
basic Local Binary Patterns Histogram algorithm. After the recognition is
completed, the attendance will be immediately updated in a SQLite database
with the relevant information. Many institutions will profit greatly from this
endeavor. As a result, the amount of time it takes and the number of human
errors it makes are minimized, making it more efficient.
Keywords : Face Detection, Viola-Jones Algorithm, Face Recognition,
Attendance, OpenCv.

Copyright: © the author(s), publisher and licensee Technoscience Academy. This is an open-access article distributed under the 261
terms of the Creative Commons Attribution Non-Commercial License, which permits unrestricted non-commercial use,
distribution, and reproduction in any medium, provided the original work is properly cited
Aparna Trivedi et al Int J Sci Res Sci & Technol. January-February-2022, 9 (1) : 261-268

I. INTRODUCTION objects, our vision should combine the different


sources of input into a meaningful and helpful pattern
Many scientific discoveries and technologies have [7]. Automatic face identification entails extracting
occurred in this modern period of automation to save important options from a photograph, golfing stroke
manpower, improve accuracy, and improve our lives. them into a useful representation, and performing
The breakthrough in the field [1] of automation some quiet categorization on them. Face recognition,
replacing conventional attendance marking activities three-dimensional reconstruction, and target
is known as an Automated Attendance System. recognition are all done with OpenCv, an open source
Biometric, smart-card, and web-based Automated module. This could be used to avoid using a proxy.
Attendance Systems are the most common types. The problem with this method is that it only catches
These systems are frequently employed in a variety of one image of a student at a time once he enters the
businesses. When the strength is greater, the classroom.
traditional method [2] of attendance marking
becomes exceedingly time consuming and The suggested system attempts to address the
cumbersome. Automation of attendance systems has shortcomings of existing systems by including
an advantage over traditional methods in that it saves features such as face detection, feature extraction,
time and can also be used for security [3]. This also feature detection, and analysis of student attendance.
aids in the prevention of bogus attendance. A facial For feature detection, the system uses techniques such
recognition system is a computer programme that as image contrasts, integral pictures, color features,
takes many images of a person and stores the data and a cascading classifier. Due to the usage of a large
about that person's face so that when that person number of face features (Shape, Color, LBP, wavelet,
appears in front of the camera again, it can verify that Auto-Correlation), the method gives higher accuracy.
person [4]. Euclidean distance and k-nearest [8] neighbor
techniques are used to recognize faces. Because the
The face is the physical manifestation of one's system considers the changes that occur in the face
individuality. As a result, we've developed a face- over time and utilizes appropriate learning
recognition-based automatic student attendance algorithms, the findings are more accurate. The
system. This technology has a lot of uses in everyday technology has been put through its paces in a variety
life, especially in security and surveillance systems. of scenarios. For the aim of testing the system's
Facial recognition technology is a framework or accuracy, we consider a specific area such as
programme that can authenticate an individual's classroom attendance. The percentage of recognized
identification by evaluating a photograph or video faces per total number of tested faces of the same
footage. The major goal of this research is to create an person is the parameter used. The system is put to the
automatic attendance system based on face test in a variety of lighting conditions, with diverse
recognition [5]. To get better results, this project's test facial expressions, partial faces (in crowded classes),
and training images are confined to frontal and and the presence or absence of a beard and spectacles.
upright facial photos [6], which only contain a single In the majority of the cases studied, improved
face. For humans, face recognition is an easy process. accuracy (almost 100 percent) is reached.
Hubel and Torsten Elie Wiesel demonstrated that we
have specialized nerve cells for specific native features
of a scene, such as lines and edges. Because humans
don't perceive the earth as a collection of disparate

International Journal of Scientific Research in Science and Technology (www.ijsrst.com) | Volume 9 | Issue 1 261
Aparna Trivedi et al Int J Sci Res Sci & Technol. January-February-2022, 9 (1) : 261-268

II. RELATED WORK although it still has to be improved in varied lighting


circumstances. The initiative places a greater
There are a number of existing systems that are emphasis on fingerprint scanning than on face
closely analogous to the proposed idea of using official recognition systems. The project will only recognise
recognition techniques and algorithms to indicate the student's face in one direction and record the
attendance in a class. A literature survey of the student's attendance [16]. The author is
proposed systems was conducted to analyses these experimenting with a new technology called
systems. The proposed case study was built around a fingerprint scanning, which comprises of a fingerprint
few key sources in the field of facial recognition and scanner and a camera. The key benefit is that even if
image processing. Using the other design the camera does not recognise the student's face
methodologies, a descriptive framework was created correctly after face registration, the student can be
[9]. This type of system makes [10] use of the RFID declared absent using this fingerprint scanner.
[11] technology and the SURF algorithm to create a CNN (Convolutional Neural Networks [17]) was used
student attendance control system. The SURF directly by the authors to detect and extract information from
modifies the scale of box features to implement the the collected photos that contained the students' faces.
scale space using box filter and integral image, similar They also used CNN to train their model and an SVM
to how SIFT produces a pyramid scale space and (Support Vector Machine) [18] classifier to classify
continually smooth’s the image with Gaussian and the images after they were trained. They were able to
then sub samples the image. The authors presented a reach a 95 present accuracy rate [19]. The system
finger print-based attendance system in [12]. A implements the attendance system by employing the
portable fingerprint device has been developed that PCA (Principle Component Analysis) technique to
may be circulated among students to allow them to recognise the faces of each and every student. It's a
lay their finger on the sensor during lecture time method for minimising the number of variables in
without the intervention of the instructor. This face recognition [20]. Every image in the training set
technology ensures that attendance is recorded in an is represented by Eigen faces, which are a linear
error-free manner. The author of [13] is dealt with combination of weighted eigenvectors. The
by the system. The issue with this type of attendance covariance matrix of a training image set yields these
system is that students may lose their ID cards for eigenvectors. When compared to other methods, this
various reasons, and there will be another algorithm has a significant computational advantage.
opportunity to collect the students' information. It's a
lengthy procedure. In addition, when compared to III. EXISTING PROBLEM
other types of facial recognition algorithms, the
algorithm processing is quite slow. This project is being carried out due to the concerns
that have been highlighted on the methods which
The authors of [14] suggested an Iris recognition lectures use to take attendance during lectures. The
system based on Daugman's algorithm. This system use of clickers, ID cards swiping and manually writing
employs an iris recognition management system that down names on a sheet of paper as a method to track
captures, extracts, stores, and matches iris recognition student attendants has prompted this project to be
images. However, laying transmission lines in areas carried out. This is not in any way to criticize the
with poor topography is a challenge. The authors of various methods used for student attendance, but to
[15] proposed a system based on real-time facial build a system that will detect the number of faces
recognition that is reliable, secure, and quick, present in a classroom as well as recognizing them.

International Journal of Scientific Research in Science and Technology (www.ijsrst.com) | Volume 9 | Issue 1 262
Aparna Trivedi et al Int J Sci Res Sci & Technol. January-February-2022, 9 (1) : 261-268

Also, a teacher will be able to tell if a student was easy to develop Web services by invoking COM or
honest as these methods mentioned can be used by COBRA components. It has powerful control
anyone for attendance records [21], but with the face capabilities as it calls directly through C, C++ or Java
detection and recognition system in place, it will be via Python [26]. The Python also processes XML and
easy to tell if a student is actually present in the other markup languages as it can run on all modern
classroom or not. This system will not only improve operating systems through same byte code.
classroom control during lectures, it will also possibly
detect faces for student attendance purposes. 4.1 Open CV

IV. Requirement OpenCV is a large open-source library for image


processing, computer vision, and machine learning.
Python is a dynamic, interpreted (byte code-compiled) Python, C++, Java, and other programming languages
language. There are no type declarations of variables, are supported by OpenCV.
parameters, functions, or methods in source code. It can analyses photos and videos to recognise items,
This makes the code short and flexible, and you lose faces, and even human handwriting. When it's paired
the compile-time type checking of the source code with other libraries, like Numpy, a highly efficient
[22]. Python tracks the types of all values at runtime library for numerical operations, the amount of
and flags code that does not make sense as it runs. weapons in your arsenal grows, as any operation that
Python comes with a large standard library that has Numpy can be merged with OpenCV [27]. OpenCV is
some handy codes and functions which we can use a cross-platform library that may be used to create
while writing code in Python. An exception is an real-time computer vision apps. It mainly focuses on
event that can occur during program exception and image processing video capture [28] and analysis
can disrupt the normal flow of program. Python including features like face detection and object
supports exception handling which means we can detection. This module covers the basic data
write less error prone code and can test various structures such as Scalar, Point, Range, etc., that are
scenarios that can cause an exception later on. used to build OpenCV applications. In addition to
these, it also includes the multidimensional array Mat,
Web framework like Django and Flask are based on which is used to store the images. In the Java library
Python. They help you write server side code which of OpenCV, this module is included as a package with
helps you manage database, write backend the name org.opencv.core. This module covers
programming logic, mapping urls etc. There are many various image processing operations such as image
machine learning applications written in Python [23]. filtering, geometrical image transformations, color
Machine learning is a way to write logic so that a space conversion, histograms, etc. In the Java library
machine can learn and solve a particular problem on of OpenCV, this module is included as a package with
its own. For example, products recommendation in the name org.opencv.imgproc.
websites like Amazon, Flipkart, eBay etc. is a machine
learning [24] algorithm that recognizes user’s interest. 4.2CSV
Face recognition and Voice [25] recognition in your
phone is another example of machine learning. Data CSV (Comma Separated Values) is a simple file format
analysis and data visualization in form of charts can used to store tabular data, such as a spread sheet or
also be developed using Python. Python integrates database. A CSV file stores tabular data (numbers and
the Enterprise Application Integration that makes it text) in plain text. Each line of the file is a data record.

International Journal of Scientific Research in Science and Technology (www.ijsrst.com) | Volume 9 | Issue 1 263
Aparna Trivedi et al Int J Sci Res Sci & Technol. January-February-2022, 9 (1) : 261-268

Each record consists of one or more fields, separated


by commas. The use of the comma as a field separator
is the source of the name for this file format. A
Comma Separated Values (CSV) file [29] is a plain text
file that contains a list of data. These files are often
used for exchanging data between different
applications. For example, databases and contact
managers often support CSV files. These files may
sometimes be called Character Separated Values or
Comma Delimited files. They mostly use the comma
Figure 1 The Use case diagram
character to separate (or delimit) data, but sometimes
use other characters, like semicolons. The idea is that
you can export complex data from one application to
a CSV file, and then import the data in that CSV file
into another application. A CSV file has a fairly
simple structure. It’s a list of data separated by
commas. For example, let’s say you have a few
contacts in a contact manager, and you export them as
a CSV file [30].

V. System Design

This is a window application developed in Python


technology, MySQL is a backend database. This Figure 2 The System Architecture
application has two type of users one is Admin user
who will upload the files to main storage with The usage period of any venture advancement is the
annotation details. Another is an end user who is a most essential stage as it yields the last arrangement,
real beneficiary of this system who can able to search which takes care of the current issue. The usage stage
for the file by providing the query keyword. With includes the real emergence of the thoughts, which
this system end user can able to get most matching were communicated in the examination report and
files in short time shown in figure 1. This system uses grew in the configuration stage shown in figure 2.
a Workload which is like a cache area with the help Execution must be an impeccable mapping of the
of the Workload space and Annotation technique this outline record in a suitable programming dialect with
system help the end user to get his required file in a specific end goal to accomplish important last item
short time. shown in figure 3. The item may be destroyed
because of off base programming dialect decided for
usage or unsatisfactory system for programming. The
coding stage must be straightforwardly connected to
the outline stage in the sense if the configuration is as
far as item situated approach then usage ought to be
ideally done in the article arranged way. Usage of any
product framework is constantly gone before by

International Journal of Scientific Research in Science and Technology (www.ijsrst.com) | Volume 9 | Issue 1 264
Aparna Trivedi et al Int J Sci Res Sci & Technol. January-February-2022, 9 (1) : 261-268

essential choice with respect to determination of stage,


the dialect utilized and so forth shown in figure 4.
These choices are regularly impact by a few variables,
for example, environment in which the framework
lives up to expectations, the rate that is needed, the
security concerns, and other execution points of
interest. The real execution choice that has been
made before the usage of this venture is
determination of the programming dialect for
improvement of the application. The venture will be
done in java, since it is an adaptable dialect. This
Figure 4 The FRBAMS Window II
dialect has been decided for the execution since it
give obliged bundle to the security. The Project work
VI. Conclusion
is executed utilizing python. The IDE overshadowing
is utilized, which streamlines the development of
Attendance marking in a class room during a lecture
utilizations. Opencv is utilized to outline the all pages
is not only a onerous task but also a time consuming
for sender and collector and Opencv code content the
neat that. Due to an unusually high number of
Python code at whatever point it obliged element
students present during the lecture there will always
conduct. The Python advancement unit is utilized to
be a probability of proxy attendance. Automatic Face
actualize all the obliged bundles. The accompanying
Recognition (AFR) has created a revolution in this
depictions layout the outcomes or yields that we are
changing world. It has ensured us with more safety of
going to get once regulated execution of th
our data. Smart attendance using Face Recognition
considerable number of modules of the framework.
comes handy in day to day activities. It helps
reducing the amount of paper and efforts for taking
manual attendance. It is a process which uses students
face to recognize them. It is done by using face
biometrics and some other features of face. It is
captured and been stored in the memory and it’s been
processed on to recognize the student by using
various algorithms and techniques. In our attendance
system, computer will be able to recognize the
student whose data has been stored and it marks
attendance of that student. Various algorithms and
Figure 3 The FRBAMS Window I techniques have been used for improving the
performance of face recognition. The concept we are
using here is Open CV. We are also using Raspberry
Pi and camera module to take image and storing them
in database. This way the attendance will be
automated. Student’s attendance is used to be usually
achieved by classical way this means record papers or
more novel approaches by hardware tools such as

International Journal of Scientific Research in Science and Technology (www.ijsrst.com) | Volume 9 | Issue 1 265
Aparna Trivedi et al Int J Sci Res Sci & Technol. January-February-2022, 9 (1) : 261-268

radio frequency identification (RFID), near field technology to track the incident and user friendly
communication (NFC), biometric identification or design.
combination of just presented. But in our proposed
system does not require to carry any hardware device VIII. REFERENCES
or to perform some kind of direct biometric
identification. The proposed system an easy way for [1]. B. K. Mohamed and C. Raghu, "Fingerprint
marking attendance where student is identified by attendance system for classroom needs,” in
camera, where the faces are matched to the one India Conference (INDICON), 2012 Annual
stored in the database after comparing the trained IEEE. IEEE, pp. 433-438, 2012
images. In this way students are automatically and [2]. K. Sun, Q. Zhao, J. Zou and X. Ma, "Attendance
indirectly monitored during classes and lectures, and security system based on building video
which is a better way for attendance system. Another surveillance", International Conference on
area of future work is improving our neural network Smart City and Intelligent Building, pp. 153-
classifier. As mentioned in the previously, it is 162, 2018
possible to construct the network to take its input [3]. Lim, S. Sim, and M. Mansor, "Rfid based
directly from the image data rather from the vector attendance system, " in Industrial Electronics
that results from an images projection into face-space. &Applications, ISIEA ,IEEE Symposium on, vol.
Perhaps learning the face projection function could 2. IEEE, pp. 778-782, 2009
increase the accuracy of the neural network classifier. [4]. W. Zhao, R. Chellappa, P. J. Phillips, and A.
Additionally, more experiments are needed to see if Rosenfeld, "Face recognition: A literature
there are other ways to tweak the network survey, " Acm Computing Surveys (CSUR), vol.
configuration to produce better results. 35, no. 4, pp. 399-458, 2003
[5]. Yusuf Perwej, “Recurrent Neural Network
VII. Future Work Method in Arabic Words Recognition System”,
International Journal of Computer Science and
Face recognition is the most biological features Telecommunications (IJCST), UK, London,
recognition technology, according to the cognitive volume 3, Issue 11, Pages 43-48, 2012.
rule of human beings, its algorithm is ten times more [6]. Yusuf Perwej , Firoj Parwej, Asif Perwej,
complex than a fingerprint algorithm. The system will “Copyright Protection of Digital Images Using
do its work even if one is not in touch with it or Robust Watermarking Based on Joint DLT and
forget about it. Face recognition is featured by the DWT ”, International Journal of Scientific &
following advantages compared to fingerprint: Using Engineering Research (IJSER), France, ISSN
face recognition accurate and fast identification, 2229-5518, Volume 3, Issue 6, Pages 1- 9, 2012
industrial leading facial recognition algorithm [7]. Robert Schalkoff, Pattern Recognition Statistical
matches more data than a fingerprint. High usability Structural and Neural Approaches, Wiley
and security in this context failure to control and Student Edition
acquire rate is less than 0.0001%, fingerprint [8]. Yusuf Perwej, “An Evaluation of Deep Learning
technology will have problems for enrolment with Miniature Concerning in Soft Computing”,
cold, wet, desquamation, elder, and around 5% people International Journal of Advanced Research in
cannot get enrolled with a photo which is captured by Computer and Communication Engineering
the camera, there is no evidence with fingerprint (IJARCCE), Volume 4, Issue 2, Pages 10 - 16,
2015, DOI: 10.17148/IJARCCE.2015.4203

International Journal of Scientific Research in Science and Technology (www.ijsrst.com) | Volume 9 | Issue 1 266
Aparna Trivedi et al Int J Sci Res Sci & Technol. January-February-2022, 9 (1) : 261-268

[9]. Radhika C, Damale, Prof. Bageshree, Quantization Artificial Neural Network”,


V.Pathak.,“Face Recognition Based Attendance International Journal of Computer Applications
System Using Machine Learning Algorithms ", (IJCA), USA, ISSN 0975 – 8887, Volume 98,
Proceedings of the Second In-ternational No.11, Pages 32 – 38, July 2014, DOI:
Conferenceon Intelligent Computingand 10.5120/17230-7556
Control Systems (ICICCS2018) IEEEXplore [18]. Yusuf Perwej, “The Bidirectional Long-Short-
Compli-ant Part Number: CFP18K74- Term Memory Neural Network based Word
ART;ISBN:978-1-5386-2842-3.IEEE 2018 Retrieval for Arabic Documents”, Transactions
[10]. Face Recognition using SURF algorithm by on Machine Learning and Artificial Intelligence
Roberto Morales Caporal, Federico Ramirez (TMLAI), ISSN 2054-7390, Volume 3, Issue 1,
Cruz conf. paper 2015 Pages 16 - 27, 2015, DOI: 10.14738/tmlai.31.863
[11]. Yusuf Perwej, Firoj Parwej, Mumdouh [19]. Nusrat Mubin Ara, Nishikanto Sarkar Simul,
Mirghani Mohamed Hassan, Nikhat Akhtar, Md. Saiful Islam.," Convolutional Neural
“The Internet-of-Things (IoT) Security: A Network (CNN) Approach for Vision Based
Technological Perspective and Review” , Student Recognition System." 201720th
International Journal of Scientific Research in International Conference of Computerand
Computer Science Engineering and Information Technology (ICCIT), 22-24, 2017
Informationm Technology (IJSRCSEIT), ISSN : [20]. Smart student attendance management system
2456-3307, Volume 5, Issue 1, Pages 462-482, using face recognition by V.P.Chitragar, Rohan
February 2019, DOI: 10.32628/CSEIT195193 Charmore, Mahesh Yeshwanthrao IJARIIE vol-
[12]. B. K. Mohamed and C. Raghu, “Fingerprint 4 2018.
attendance system for classroom needs,” in [21]. Md Shafiqul Islam et al., "A Combined Feature
India Conference (INDICON), 2012 Annual Extraction Method for Automated Face
IEEE. IEEE, pp. 433–438, 2012 Recognition in Classroom Environment",
[13]. Ali akbar punjani, chowdhary obaid, automated International Symposium on Signal Processing
attendance management system using face and Intelligent Recognition Systems, 2017
recognition international journal of advanced [22]. Z. Dobesova, "Automatic generation of digital
computer science and technology vol 6 2017 elevation models using Python scripts",
[14]. S. Kadry and K. Smaili, “A design and Conference Proceedings SGEM 2011 11th
implementation of a wireless iris recognition International Multidisciplinary Scientific
attendance management system,” Infor. Tech. GeoConference, pp. 599-604, 2011, ISSN 1314-
and control, vol. 36, no. 3, pp. 323–329, 2007 2704
[15]. T. A. P. K. K. L... Roshan- Tharanga, S. M. S. C. [23]. V.L. Ceder, K. McDonald and D.D, Harms, The
Samarakoon, “Smart attendance using real time quick Python book, Manning, pp. 335, 2010
face recognition,” 2013 [24]. Yusuf Perwej, Nikhat Akhtar, Firoj Parwej,“The
[16]. Multimodal student attendance management Kingdom of Saudi Arabia Vehicle License Plate
system by khalel mohammed, A.S. Toba, Recognition using Learning Vector
Mohammed Elmogy Ain shams engineering Quantization Artificial Neural Network”,
journal 2019 International Journal of Computer Applications
[17]. Yusuf Perwej, Nikhat Akhtar, Firoj Parwej,“The (IJCA), USA, ISSN 0975 – 8887, Volume 98,
Kingdom of Saudi Arabia Vehicle License Plate No.11, Pages 32 – 38, July 2014, DOI:
Recognition using Learning Vector 10.5120/17230-7556

International Journal of Scientific Research in Science and Technology (www.ijsrst.com) | Volume 9 | Issue 1 267
Aparna Trivedi et al Int J Sci Res Sci & Technol. January-February-2022, 9 (1) : 261-268

[25]. Yusuf Perwej, Firoj Parwej, “Perceptual


Evolution of Playout Buffer Algorithm for
Enhancing Perceived Quality of Voice
Transmission over IP”, International Journal of
Mobile Network Communications & Telematics
(IJMNCT), USA, Volume 2, No. 2, Pages 1- 19,
April 2012 DOI: 10.5121/ijmnct.2012.2201
[26]. P.J. Guo, "March Online python tutor:
embeddable web-based program visualization
for CS education", proceedings of the 44th ACM
technical symposium on Computer science
education, pp. 579-584, 2013
[27]. Computer Vision with OpenCV Library, Kindle
Edition. Gary Bradskl and AndrianKehlar
[28]. Yusuf Perwej , Firoj Parwej, Asif Perwej,
“Copyright Protection of Digital Images Using
Robust Watermarking Based on Joint DLT and
DWT ”, International Journal of Scientific &
Engineering Research (IJSER), France, ISSN
2229-5518, Volume 3, Issue 6, Pages 1- 9, 2012
[29]. M. Arenas, F. Maturana, C. Riveros and D.
Vrgoc, "A framework for annotating CSV-like
data", Proc. VLDB Endow, vol. 9, no. 11, pp.
876-887, 2016
[30]. Y. Shafranovich, "Common Format and MIME
Type for Comma-Separated Values (CSV) Files",
IETF RFC 4180, October 2005

Cite this article as :

Aparna Trivedi, Chandan Mani Tripathi, Dr. Yusuf


Perwej, Ashish Kumar Srivastava, Neha Kulshrestha,
"Face Recognition Based Automated Attendance
Management System ", International Journal of
Scientific Research in Science and Technology
(IJSRST), Online ISSN : 2395-602X, Print ISSN : 2395-
6011, Volume 9 Issue 1, pp. 261-268, January-
February 2022. Available at doi :
https://doi.org/10.32628/IJSRST229147
Journal URL : https://ijsrst.com/IJSRST229147

International Journal of Scientific Research in Science and Technology (www.ijsrst.com) | Volume 9 | Issue 1 268

View publication stats

You might also like