Automated Attendance Marking
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2016, Vol 4, Issue 4
Abstract
The Internet of Things (IoT) is the network of physical objects — devices, vehicles, buildings and other items embedded with electronics, software, sensors, and network connectivity — that enables these objects to collect and exchange data. The Internet of Things allows objects to be sensed and controlled remotely across existing network infrastructure, creating opportunities for more direct integration of the physical world into computer-based systems, and resulting in improved efficiency, accuracy and economic benefit. The attendance marking system comprises of manual roll call and involves a lot of paper work, making it difficult to search for any data and perform modifications on them. In this type of system, there is a lot of scope for proxy attendance. To solve these issues, our proposed system has automated the attendance marking process by using RFID and face detection technologies. RFID scanner is used for detecting the RFID tag; a camera captures the image of the student. The Robust Real Time Face Detection Technology detects the face in the image. The face extraction algorithm extracts the inner face to identify the cardholder. The outcome of this system is the automatic marking of attendance.
Authors and Affiliations
Mamtha G, Rajeshwari M, Srivardhini P, Ms. S Umamageswari
Design and Development Aspects of Process Instrumentation for a Newly Developed Technology
Process development is a multidisciplinary field involving experts from various branches of engineering such as chemical, instrumentation, mechanical, electrical and electronics engineering. The role of an instrumentati...
Bioremediation of Grounds Contaminated With Petroleum Products by HEAP Method
Effective and sustainable reclamation of degraded postindustrial and military areas still requires improvements in methods and approaches. It applies especially for physical, chemical as well as biological remediation m...
Forward and Backward Sweep Algorithm for Distribution Power Flow Analysis and Comparison of Different Load Flow Methods
Power flow analysis is a very important and fundamental tool for the analysis of any electrical distribution system and is used in the operational as well as planning stages. Certain applications particularly in distrib...
Vulnerabilities Analysis of WI-FI Networks
Modern surveillance devices are increasingly being taken off private networks and placed onto networks connected via gateway to the Internet or into Wi-Fi based local area wireless networks (LAWN). The devices are also...
Evolution and Performance Analysis of Multiple Spoofing Attackers in Wireless Networks
Spoofing attack is an identity based attack through which a malicious user can spoof the MAC address of an node to create multiple illegitimate identities that highly affect the performance of wireless sensor network. T...