Capstone Project
Capstone Project
Introduction
useful features because of its capability to scan and identify the user
Examples include, but are not limited to fingerprint, palm veins, face
1
Facial recognition or face detection is one of those identifiers that
not.
Attendance systems are one of the most used systems used by their
and useful because not only are they being marked or not, but can
also record their time and date the day they are marked. This
system was also being used by many companies so that they can
2
There are schools and universities that are using a biometric based
attendance system but it was only being used by the teachers and
staff that uses iris and fingerprints to mark their attendance while the
know if the students are present or not. Attendance is not only for
students but also for teachers, staff, higher positioned, etc. because
it will determine if they are present and if not they can adjust their
daily tasks. They are other types of attendance system that uses
your body features like your iris, fingerprints, etc. Systems that use
3
biometric technology are not only for attendance but also for
body appearance and if it’s not matched, the security or police will
the police and the government so that they can easily monitor their
Theoretical Framework
some schools haven’t yet used this system. The system will be
4
their attendance by using the system.
Figure 1.0
5
All possible requirements of the system to be developed are
specification document.
System Design
Implementation
the next phase. Each unit is developed and tested for its
the entire system is tested for any faults and failures. During the
6
testing phase, it can edit its system design so that it can fix any
market.
Maintenance
Conceptual Framework
7
Conceptual Framework is a type of intermediate theory that
attempts to an aspect of inquiry. It can also act like maps that give
Figure 2.0
Facial Recognition
attendance system via facial recognition. In the input, The user must
8
to be are the facial information of the user, his/her name and the
time they check in. The device that the system will use is a face
recognition device that will scan the face of the user and a computer
shows the time they had checked in the system and also shows the
the system.
the users; it is a test to determine if the system gives the users their
9
attendance.
why these two are one of the problems that the teacher or anyone
though the teachers will be the ones who will mark the student’s
absent that had a reason that they will not be in the school. This
kind of topic needs to be brought up to the public for the reason and
10
also it will improve their flexibility regarding marking the student’s
your attendance marked can easily be done and since the modern
the current era and also we can understand more about technology.
Hypothesis
11
The result of the project will merit the following:
Students: In this project, the students are one of the main targets
for this project because it regards the attendance of the targets and
it will also become beneficial not only for the school but also for the
students.
Teachers: The teachers are also one of the main targets because
they are the ones who will not only take attendance but also get the
who will manage the system’s contents and they will be the ones
towards this project because they had the highest authority in the
school or university.
12
The scope of the study is for the library and the main gate. The
project will cover all of the students when they enter the main gate.
The students will just face the webcam or camera before they enter
the campus grounds and the system will mark their attendance. All
present.
Definition of Terms
13
features from a given image.
graduate levels.
system.
14
CHAPTER II
Related Studies
Foreign Studies
https://www.researchgate.net/publication/316091971_Real-
time_face_recognition_for_attendance_monitoring_system
15
project the face of an individual is used for the purpose of
processing.”
http://ethesis.nitrkl.ac.in/7301/1/AUTOMATED_Mallik_2015.pdf
recognition stages. The focus of this study is on the last stage of the
16
recognition use the entire facial image as the input to their
algorithms.”
https://scholarworks.sjsu.edu/cgi/viewcontent.cgi?article=8182&
context=etd_theses
part of our everyday lives. The use of facial recognition systems has
https://core.ac.uk/download/pdf/61804826.pdf
17
According to Nandhini R, Duraimurugan and S.P. Chokkalingam
states that:
system will be able to find and recognize human faces fast and
conversion of the frames of the video into images so that the face of
the student can be easily recognized for their attendance so that the
https://www.ijeat.org/wp-
content/uploads/papers/v8i3S/C11230283S19.pdf
18
Local Studies
facial feature points (eyes, eyebrows, mouth and nose) and all data
19
personal identification which contains certain fields about the
registered user, it cannot detect the skin color and age of a person
and the system is not a video- based face recognition system. This
system does not expect to solve all the issues in face recognition,
information.
http://www.ijstr.org/final-print/dec2014/Student-Monitoring-System-
Of-Our-Lady-Of-Fatima-University-Using-Face-Recognition.pdf
https://www.researchgate.net/publication/339602176_A_YOLOv3_In
ference_Approach_for_Student_Attendance_Face_Recognition_Sy
20
stem
https://philssj.org/index.php/main/article/view/214
21
As a result, there is a solution for the unrecognized. Moreover, due
https://ejournals.ph/article.php?id=2804
Police (PNP) do not have a central database for it. Hence, police
the case.”
https://dl.acm.org/doi/abs/10.1145/3205946.3205952
22
Related Literatures
Foreign Literature
https://analyticsindiamag.com/a-complete-guide-on-building-a-face-
attendance-system/
23
study of the main market trends, market threats, and the full market
methodologies.”
https://analyticsindiamag.com/a-complete-guide-on-building-a-face-
attendance-system/
24
https://www.securitymagazine.com/articles/94201-securing-and-
facilitating-online-education-with-voice-biometrics
students and staff for fevers. The devices were sold by a company
it had pivoted. Its new product, called GoSafe, could scan foreheads
https://www.wired.com/story/schools-adopt-face-recognition-name-
fighting-covid/
"Over time, our face could well be our digital identity, and
25
pathway to digital transformation. You can have paperless borders;
https://menafn.com/1101630432/Facial-recognition-in-UAE-How-
will-it-change-lives
Local Literature
instance) is easy to use but has low accuracy. Fingerprint (on the
other hand) has high accuracy, and is easy to use and reliable.”
https://www.pna.gov.ph/articles/1087335
26
The new system is currently being deployed at the NCRPO regional
https://findbiometrics.com/biometrics-news-philippines-police-adopt-
biometric-tracking-system-catch-truant-officers-010206/
27
FICO stated that:
biometrics, with the study revealing that 72% are also happy to
second (40%) and eye scans came in third (23%). A more popular
https://fintechnews.sg/41682/fintechphilippines/fico-survey-filipinos-
showing-greater-acceptance-for-biometrics/
28
technology and the market, I would like to discuss common
https://www.biometricupdate.com/202004/using-fingerprint-
recognition-under-covid-19
Synthesis
According to the literature, biometrics has been used for many years
not only for face recognition but other types of identifiers as well.
The researcher gets the idea because of how biometrics was being
used for many years, the idea will help not only for teachers and
staff but also for the students considering how hard marking
mark its attendance when it faces the webcam. It aims to attain the
goal of providing for the benefits for the entirety of the school.
29
CHAPTER III
Methodology
wide-ranging result.
The methods stated below gives the partial idea on how the
30
a population, situation or phenomenon. It can answer what, where,
them.
Surveys
Survey research allows you to gather large volumes of data that can
of surveys include:
31
● Evaluating satisfaction with a company’s products or
an organization’s services
Observations
Case Studies
32
across time or location, case studies gather detailed data to identify
research problem.
possible to collect data from every person in that group. Instead, you
33
allowing you to make strong statistical inferences about
valid choice.
34
Figure 3.0
To conduct this type of sampling, you can use tools like random
35
number generators or other techniques that are based entirely on
chance.
Example
2. Systematic sampling
Example
36
(6, 16, 26, 36, and so on), and you end up with a sample of 100
people.
hidden pattern in the list that might skew the sample. For example, if
are listed in order of seniority, there is a risk that your interval might
3. Stratified sampling
37
how many people should be sampled from each subgroup. Then
each subgroup.
Example
The company has 800 female employees and 200 male employees.
You want to ensure that the sample reflects the gender balance of
the company, so you sort the population into two strata based on
100 people.
4. Cluster sampling
each sampled cluster. If the clusters themselves are large, you can
38
also sample individuals from within each cluster using one of the
techniques above.
whole population.
Example
The company has offices in 10 cities across the country (all with
have the capacity to travel to every office to collect your data, so you
39
included.
higher risk of sampling bias. That means the inferences you can
40
Figure 4.0
1. Convenience sampling
This is an easy and inexpensive way to gather initial data, but there
41
it can’t produce generalizable results.
Example
to gather data, but as you only surveyed students taking the same
others.
42
Example
You send out the survey to all students at your university and a lot of
students decide to complete it. This can certainly give you some
insight into the topic, but the people who responded are more likely
of all students.
3. Purposive sampling
Example
43
You want to know more about the opinions and experiences of
4. Snowball sampling
people.
Example
participate in the research, and she puts you in contact with other
44
Respondents of the Study
The locale of this study was in the National College of Business and
Instrumentation
instruments.
45
as instant messaging, email, or video. Online interviews require
the internet generally through filling out a form. Online surveys can
vary in length and format. The data is stored in a database and the
collect data via the internet. Many of these online research methods
46
are related to existing research methodologies but re-invent and re
used by the parents, students, cooking savvy, and people who have
an interest in it.
Procedures
47
And another one is interviewing the target respondents via chat or
video call within the topic process may take a lot of time and effort
in this study:
to some of the individual values. If all the weights are equal, then the
Formula:
48
Where:
Formula:
T= 1/f
Where:
T = period
1 = cycle
f = frequency
49
Percentage Is a way of expressing a number as a fraction of 100
Formula:
P=N/F * 100
Where:
P = Percentage
F = Frequency
N = Number of Respondents
from which respondents choose one option that best aligns with
50
their view. A method of ascribing quantitative data, to make it
each potential choice and a mean figure for all the responses is
1 = Strongly Disagree
2 = Disagree
3 = Neutral
4 = Agree
5 = Strongly Agree
Accessibility
4 - Agree 8 16% 4
3 - Neutral 16 32% 1
2 - Disagree 13 26% 2
51
1 - Strongly Disagree 5 10% 5
Table 1.0
Table 1.0 shows the total respondents answered strongly agree and
Accuracy
4 - Agree 7 14% 4
3 - Neutral 14 28% 1
2 - Disagree 13 26% 2
Table 2.0
52
Speed
4 - Agree 9 18% 4
3 - Neutral 12 24% 1
2 - Disagree 12 24% 2
Table 3.0
(18%) chooses both strongly agree and agree and sixteen percent
Security
4 - Agree 11 22% 2
3 - Neutral 11 22% 3
2 - Disagree 13 26% 1
Table 4.0
53
Table 4.0 shows the total of 11 respondents answered agreed and
Usability
4 - Agree 11 22% 1
3 - Neutral 11 22% 2
2 - Disagree 11 22% 3
Table 5.0
strongly disagree.
Reliability
54
5 - Strongly Agree 10 20% 3
4 - Agree 9 18% 4
3 - Neutral 14 28% 1
2 - Disagree 12 24% 2
Table 6.0
disagree.
Security 8 11 11 13 7 3 9
55
Reliability 10 9 14 12 5 3.14 9.86
Accessibility
4 - Agree 25 50% 1
3 - Neutral 4 8% 5
2 - Disagree 5 10% 4
Table 8.0
Accuracy
56
4 - Agree 26 52% 1
3 - Neutral 5 10% 3
2 - Disagree 5 10% 4
Table 9.0
Speed
4 - Agree 25 50% 1
3 - Neutral 6 12% 3
2 - Disagree 4 8% 5
Table 10.0
57
percent (12%) chooses neutral. Eight percent (8%) disagree and ten
Security
4 - Agree 26 52% 1
3 - Neutral 7 14% 3
2 - Disagree 3 6% 5
Table 11.0
Usability
4 - Agree 24 48% 1
3 - Neutral 5 10% 4
58
2 - Disagree 7 14% 3
Table 12.0
Reliability
4 - Agree 23 46% 1
3 - Neutral 8 16% 3
2 - Disagree 6 12% 4
Table 13.0
59
Sixteen percent (16%) chooses neutral. Twelve percent (12%)
= 21.1 / 6
= 3.52
60
= 18.26 / 6
= 3.04
= 0.48 / 0.18
= 2.67
T Computed = 2.67
61