scholarly journals Tempus-A Facial Recognition Technology in Attendance Monitoring

2020 ◽  
Vol 3 (2) ◽  
pp. 175-176
Author(s):  
Melanie M. Reynoso ◽  
Ariane M. Torres

Attendance monitoring has strategic importance for every organization. It has shifted from utilizing paper-based attendance monitoring to biometrics, radio-frequency identification, Bluetooth and smart technologies, Internet of Things (IoT), cloud computing, or face recognition technology. Tempus is an automated attendance monitoring system that uses face recognition technology for input, real-time IoT capabilities for processing, and portability of mobile platforms for output. It has hardware and software components. The core of the hardware component is Raspberry Pi 3, which serves as a communication medium between the camera sensor and the information system. Tempus uses Haar Cascade for facial detection and Linear Binary Pattern Histogram (LBPH) for facial recognition. The software component is further divided into two: 1) the information system for administrators, an attendance monitoring which allows encoding of data, creating new user accounts, managing schedules, recording attendance, and generating reports; and 2) mobile platform for end-users, the teachers, that is provided for communication and notification purposes only.

2014 ◽  
Vol 651-653 ◽  
pp. 2040-2044
Author(s):  
Ci Nian Wang

After a full analysis of the principle and general structure of Medicine Distribution Center (MDC), this paper researches the application of RFID (Radio Frequency Identification) in MDC. The MDC adopts the RFID as the support platform, covering the medicines’ entry, picking, checking, delivery and many other operation flows. The paper also constructs a new medicine-distribution mode and its information system model in accordance with GPS (global positioning system), GIS (geographical information system) and routing optimization technology. The MDC can collect, deliver, check, and update mass data on the medicines’ entry and delivery, the labor intensity being decreased. Fault scanning, miss scanning, re-scanning and other artificial errors have been avoided, and the efficiency and accuracy improved.


IoT (Internet of Things) made headway from Machine to Machine communication without human intrusion for number of machines to connect with the aid of network. There is esteem; by 2020 there will be 26 times more connected things than people. Hence, the concern of security rises along with the high installments. The BlockChain Technology takes place of all central entities, which is peer to peer communication with the distributed network. In this paper, two Arduino boards as nodes and a Raspberry Pi as server are to be configured to connect to the Wi-Fi using ESP8266(node mc). To make data transmission from the two nodes to server, integration of temperature and humidity sensor in one node and RFID (Radio Frequency Identification) reader in other node is to be done. Data should be in the form of blocks and integration of data is in the form of a chain, forming it a Blockchain. All the blocks are linked in the chain manner of which the current hash of the previous block must match with the previous hash of the next block. Then only the blocks of data are secured. While receiving data every time from nodes to server, the previous hash is to be checked such that the arrival of the information is being verified to know if it’s really genuine. If the cryptographic hash does not match then data manipulation is happened. So, in this paper, we will see, along with how practically the security is highly offered by the blockchain technology and how can we easily identify if the data has been tampered along the way it reaches to us. Henceforth, we will found a way of application to secure our IoT data without any regrets in this paper.


2018 ◽  
Vol 23 (4) ◽  
pp. 614-628 ◽  
Author(s):  
Debbie Watson ◽  
Chloe Meineck ◽  
Beth Lancaster

This article presents an innovative project to develop and trial a prototype product called ‘trove’ to start to address challenges identified regarding current practice of life story work with children who are looked after and adopted. trove is a digitally enhanced memory box that utilises raspberry pi (a small single board computer) and radio-frequency identification (RFID) technologies to enable children to record their memories and to attach these to their precious objects using an electronic tag: providing a safe ‘container’ for their mementoes and memories. Located in theories of narrative identity and object attachment and drawing on Brodinsky’s concept of communicative openness, we describe the children’s engagements in the design and report the results of a small trial of 10 troves with adopted children in England.


2022 ◽  
pp. 168-180
Author(s):  
Sasikumar Gurumoorthy ◽  
L. Venkateswara Reddy ◽  
Sudhakaran Periakaruppan

Art colonnades and museums all over the world are the first option for individuals to visit for the enhancement of the cultural life of people. To ensure their safety, museums have established numerous cultural security measures. Traditional strategies do not obstruct their pace entirely. They only use a computer in the museum to check individuals at the entrance and exit. Therefore, the authors proposed a gallery anti-stealing device created on the internet-of-things (IoT) technology that ensures security through passive readers/writers of RFID. Radio frequency identification (RFID) remains a system that practices isolated data storing and recovery and offers object tracking with a unique identity code. The system then sends sound and light warning information, while the photographic camera structure is triggered to capture a picture at the same time. The recognition of the accuracy in the hardware component of the device can be additionally enhanced by the use of this technology to increase the safety of museum equipment.


2014 ◽  
Vol 568-570 ◽  
pp. 1593-1596
Author(s):  
Hao Fei Xie ◽  
Chong Yang Li ◽  
Guo Qi Zhang ◽  
De Long Su

In order to remedy the deficiency of application of bar code that needs artificial intervention in automotive manufacture, we propose a solution to integrate Radio Frequency Identification (RFID) system in the original enterprise information system based on Web service. Distributed real-time data of welding, lacquer covering and assembly workshops in the automotive manufacture are collected, that are used in the enterprise information system to provide more productions information for management. Firstly, the architecture of integrating the RFID system and the Manufacturing Execution System (MES) in automotive manufacture is given, that is focused on the RFID system network, the Middleware and the Application Gateway. Finally, web service implementation is designed to integrate RFID system in enterprise information system.


2020 ◽  
Vol 39 (3) ◽  
pp. 896-904
Author(s):  
J.A. Popoola ◽  
C.O. Yinka-Banjo

Systems and applications embedded with facial detection and recognition capabilities are founded on the notion that there are differences in face structures among individuals, and as such, we can perform face-matching using the facial symmetry. A widely used application of facial detection and recognition is in security. It is important that the images be processed correctly for computer-based facial recognition, hence, the usage of efficient, cost-effective algorithms and a robust database. This research work puts these measures into consideration and attempts to determine a cost-effective and reliable algorithm out of three algorithms examined. Keywords: Haar-Cascade, PCA, Eigenfaces, Fisherfaces, LBPH, Face Recognition.


2018 ◽  
Vol 197 ◽  
pp. 11008 ◽  
Author(s):  
Asep Najmurrokhman ◽  
Kusnandar Kusnandar ◽  
Arief Budiman Krama ◽  
Esmeralda Contessa Djamal ◽  
Robbi Rahim

Security issues are an important part of everyday life. A vital link in security chain is the identification of users who will enter the room. This paper describes the prototype of a secured room access control system based on face recognition. The system comprises a webcam to detect faces and a solenoid door lock for accessing the room. Every user detected by the webcam will be checked for compatibility with the database in the system. If the user has access rights then the solenoid door lock will open and the user can enter the room. Otherwise, the data will be sent to the master user via Android-based smartphone that installed certain applications. If the user is recognized by the master user, then the solenoid door lock will be opened through the signal sent from the smartphone. However, if the user is not recognized, then the buzzer will alert. The main control circuit on this system is Raspberry pi. The software used is OpenCV Library which is useful to display and process the image produced by webcam. In this paper, we employ Haar Cascade Classifier in an image processing of user face to render the face detection with high accuracy.


Sign in / Sign up

Export Citation Format

Share Document