Manuscript Anu+ (1) Final+PDF+
Manuscript Anu+ (1) Final+PDF+
Manuscript Anu+ (1) Final+PDF+
7
Journal of Harbin Engineering University July 2023
ISSN: 1006-7043
Abstract— The existing method of taking attendance on paper is not only time-consuming, but also requires
significant effort on the part of the trainer. Therefore, this research aims to explore the potential of leveraging
facial recognition technology and the location of students' registered mobile devices within the classroom
setting to effectively monitor student attendance. By incorporating biometric facial recognition and location
tracking, a robust platform for attendance tracking can be established. The image recognition-based system
offers the advantage of being applicable to any classroom environment with minimal setup and maintenance
costs. Furthermore, it provides a convenient solution as students can effortlessly register their attendance
using their mobile devices. Ultimately, such systems provide a dependable and secure platform for monitoring
attendance, alleviating the burden on trainers by reducing their time and effort expenditure.
I. Introduction
The amount of time instructors and staff spend these methods still need a significant amount of
monitoring students' attendance is one of the most time and effort. The work focuses on using
pressing concerns that educational institutions face sophisticated technology in classrooms to track
today. Schools and colleges have used technological student attendance, such as face recognition
innovation to improve their Attendance Monitoring software and the whereabouts of registered mobile
System. Universities have benefited from improved devices. Attendance tracking is made more reliable
IT infrastructure in tracking attendance, reducing by biometric facial recognition and location
administrative labor, and increasing delivery of the tracking. This method is lucrative, sustainable and
talk. dependable. It eliminates the need for the
instructor to manually record attendance, saving
Parents, staff, students, and the general public are time and effort. Furthermore, it is a secure method
depending more and more on IT infrastructure, and since the student must be physically present in the
they are no longer relying on information from
classroom and have their face recognized for their
schools and institutions on their children's presence to be recorded. This system may be used
attendance. Regardless of their location, they may in any classroom and requires very little setup and
access the database with a simple click. The security maintenance. It is also a convenient approach since
of these systems is essential for preventing fraud by students may readily record their attendance using
unauthorized users. Systems for tracking students' mobile devices. This paper demonstrates how face
attendance have all been technologically upgraded
recognition time attendance systems can help
to correctly track students and, as a consequence, educational institutions automate time attendance
save the time spent manually collecting students'
systems more cost-effectively by eliminating
attendance [1]. administrative responsibilities. Three distinct
In schools, colleges, and universities, verifying models are suggested, each with its own set of
attendance has become a difficult chore. Paper costs. In summary, the given framework provides a
attendance takes time and involves a lot of effort dependable and secure platform for tracking
on the part of the trainer. To solve this issue, attendance while decreasing the instructor's time
numerous educational institutions have established and effort.
online attendance monitoring systems. However,
197
Vol 44 No. 7
Journal of Harbin Engineering University July 2023
ISSN: 1006-7043
II. Literature Review process. Oyetola et al. [4] has highlighted that data
authentication is a crucial component of attendance
For many years, all academic institutions employed monitoring and that it is highly important to secure
the manual attendance method to track student such system from threats. Further, Arlugon et al. [5]
attendance. It is undeniably a time-consuming claimed that by using bar codes, RFID, QR codes,
process that may result in blunders when marking. NFC, etc. to track student attendance, time can be
However, times have changed, and technology now saved. School administrators can utilize this data to
dominates all types of businesses, including
make management choices. The importance of RFID
educational institutions. As a result, a more precise technology in permitting wireless identification
and effective system of tracking student attendance
through the use of appropriate readers has also
has been developed. According to Rjeib et al. [2], been discussed in the paper.
student attendance is an essential factor that
indicates academic progress. As a result, it is critical Opoku [6] has demonstrated a biometric system-
to build robust IT systems capable of tracking and based project that used technology to integrate
monitoring student attendance in a cost-effective time and biometrics with attendance verification.
and timely way. There are several automatic Hussain et al. [7] discussed the purpose of
attendance tracking solutions accessible that are attendance tracking and how it connects to human
time-saving and technologically advanced. attendance maintenance faults the next year. They
Additionally, Mustapha et al. [3] highlighted the established an RFID-based web-based attendance
difficulties associated with manual attendance management system that enables users to check
management and insufficient record-keeping. their attendance. Each student is given a distinct
Consequently, they proposed the adoption of an IT RFID card or tag as part of the test hall management
infrastructure that utilizes RFID card readers, system. The card reader assists workers by creating
enabling students to register themselves upon a seat number, which is immediately shown on the
entering the classroom. This approach aims to LCD, ensuring that the exam goes smoothly and
minimize errors and streamline the attendance keeping track of attendance.
RFID technology in education, according to Irawan et discussed by Chiagozie et al. [10] as a mature
al. [9], creates real-time attendance while detecting technology suited to automate activities. RFID has
absentees, so that management may take the developed quickly in recent years, and it has the
necessary steps to improve the efficiency of the potential to improve system efficacy when combined
learning process. In order to prevent kids from with IoT. Later, Nyugen et al. [11] also suggested that
skipping classes, this will allow parents, instructors, RFID and IoT would improve attendance monitoring
and students to obtain real-time information and to fulfil the demands of educational institutions due
take preventative measures, as well as make the to today's rising requirement for data quality and
teaching learning process go more smoothly. Fig. 1 efficiency.
displays an RFID system and its components. RFID
These days, smartphone-based applications that
middleware is required for computer systems to
communicate with RFID data. RFID readers obtain automate the manual attendance process are also
being used for tracking attendance and saving time
information from transponders, which function as
both a receiver and a transmitter. RFID has also been and resources [12]. The instructor can control every
198
Vol 44 No. 7
Journal of Harbin Engineering University July 2023
ISSN: 1006-7043
aspect of the mobile application, ensuring the The proposed model in our research provides a
correctness of the records providing a more accurate comprehensive framework for attendance marking
record of student attendance. One aspect of this and monitoring systems and aids in the resolution of
approach the instructor has the. This allows the user the following objectives:
to fix any error they may have made when recording
attendance. It is a simple and affordable way to keep Automation: This approach aids in the automation of
daily records. These applications offer numerous the entire process, lowering the price and time
needed to finish attendance monitoring on schedule.
features and possibilities including the provision for
calculating the percentage of total attendance for Security: In the end, the system produces a more
each student. Students can also keep track of their secure and dependable platform for tracking
attendance and receive frequent updates. The attendance since it is totally automated and makes
Mobile Based Attendance System (MBAS) smart use of three different technologies for identification
phone application can run on Android or iOS. MBAS and authorization.
uses smartphones to track and record student
attendance [13]. The now-available phone Centralization: Centralizing the whole thing can
application requires login ID to be entered before it improve control and make implementation easier.
can collect attendance and connect to the server.
The following are a few considerations that should
These phone records are sent to the servers through
be made during/before implementation.
GPRS and the attendance is instantly updated. This is
a computerized attendance system that promotes Cost: This system incurs costs during
sustainability, by saving paper and time [14]. To keep implementation; therefore, while adopting this
track of attendance, there is no need for a manual model, all the alternatives must be thoroughly
logbook or record book. Information is reachable evaluated in terms of price and performance, as well
from everywhere, 24 hours a day, 7 days a week. It as their aim. If all choices are used together, it may
facilitates the generation of student attendance be more expensive than the set objectives.
sheets, which can include all of the student's
information such as roll number, name, time Skill: The institution/university will also need the
present/absent, and so on. It is a secure attendance strong support of a trained IT staff to handle all of
approach rather than a regular one, as well as a this attendance monitoring system setup, but this
future education effort. will not be difficult.
The face detection/recognition attendance systems Because everything is based on software, the
discussed in [15-16] are simple to use and aid in the majority of the items in this suggested paradigm are
retention of attendance data. It functions as a kind of readily controllable.
biometric system that stores the children's
Anonymity: This suggested model's intrinsic
distinctive and varied face traits as stencils in the
anonymity provides an appropriate platform for
system database. The student must gaze at the
securing student identification, it must be preserved
camera once the system has completed registering
confidential.
him or her so that the camera can detect the
student's face and properly update the attendance IV. Design of proposed model for attendance
system. This method results in error-free attendance monitoring
records 95% of the time. This method is also eco-
friendly because no paper or time is wasted. It A structure for an automated student attendance
eliminates human mistakes, is accurate and tracking and marking system is proposed in our
automated, and promotes security. Lecturers receive paper. It uses facial recognition technology to
monthly reports, and attendance is simply drastically minimize the time and effort necessary for
estimated. routine attendance taking in each class. Our
suggested system (Fig. 2) captures facial pictures
III. Advantages of the proposed face recognition with a camera and uses the Haar-Cascade and Local
Model Pattern Binary Histogram (LPBH) algorithms for face
199
Vol 44 No. 7
Journal of Harbin Engineering University July 2023
ISSN: 1006-7043
As students enter the classroom, the technology Ensure that the dataset represents a diverse range
captures their facial images and compares them to of students with various poses, expressions, and
the pictures in the database. Because it is more lighting conditions.
accurate and resilient against shifting lighting 2. Preprocessing: Preprocess the images to
conditions, position, and facial emotions, the LPBH enhance the quality and make them suitable for
algorithm is utilized for face recognition. In further analysis. Common preprocessing steps
addition, the system records the student's mobile include resizing the images to a fixed size,
device with the campus network, which may be converting them to grayscale, and normalizing the
recognized by adjacent access points (router log). pixel values.
This adds another layer of verification to the 3. Face Detection: Use the Haar Transform-
student's attendance. based face detection algorithm to detect faces in
the images. The Haar Cascade Classifier is a
It eliminates the need for manual attendance popular choice for this task. It works by identifying
taking and marking for tutors, saving time and specific features in the image, such as edges,
effort. Second, by ensuring that only registered
corners, and lines, to locate potential face regions.
students are present in class, it reduces the risk of Haar-like features are rectangular patterns of
attendance fraud. Third, it provides real-time adjacent pixel groups that capture relative light
attendance tracking, which allows teachers to
and dark areas in an image. These features can be
keep track of students who are absent or tardy. easily scaled to detect objects of various sizes. To
Overall, our suggested framework provides a cost- detect specific objects, such as human faces, the
effective and efficient approach for tracking Haar cascade classifier is trained using the gentle
student attendance with facial recognition AdaBoost algorithm and Haar feature algorithms.
technology.
During training, positive samples (images
V. Methodology containing faces) and negative samples (images
without faces) are used to create a strong classifier
To implement image detection and recognition for that can distinguish between faces and non-faces.
student attendance monitoring, techniques such
as Haar Transform and Local Binary Patterns The trained Haar cascade classifier consists of
Histograms (LBPH) have been used. Following are multiple stages, each containing a set of weak
the steps involved in the training algorithm: classifiers. The cascading technique allows the
classifier to quickly reject sub-images that are
1. Data Collection: Gather a dataset of unlikely to contain the object of interest, thereby
images containing students' faces for training. reducing the computational load. Sub-images that
200
Vol 44 No. 7
Journal of Harbin Engineering University July 2023
ISSN: 1006-7043
pass each stage's threshold are further analyzed by detected face, indicating the progress of the
subsequent stages, increasing the accuracy of detection process.
detection. To improve the recognition accuracy,
align the detected faces to a standardized pose. 4. Feature Extraction: Apply the LBPH
Techniques like landmark detection can be used to operator on the aligned face images to extract
locate facial landmarks (e.g., eyes, nose, and discriminative features. LBPH captures local
mouth), and then apply transformation techniques texture patterns by comparing the intensity values
of pixels in a circular neighborhood around each
to normalize the face. When a face is detected, a
green square or bounding box is drawn around the pixel. This generates a histogram representation
for each face image.
5. Labeling: Assign a unique label to each face determined distance so that 'confidence' may be
image in the dataset to identify the corresponding calculated. Lower confidences are preferred since
student. they suggest a tighter gap between the two
6. Applying face recognition: Each histogram histograms; do not be fooled by the word
produced reflects a single image from the training "confidence."
dataset, ensuring that it is accurately represented. Following that, we can use a threshold and
To generate a histogram that accurately represents "confidence" to make a judgment. We can
a new image, we repeat the process by using the determine whether the image was accurately
input image as the input for histogram generating recognized when the algorithm has completed its
photo. recognition procedure. If the confidence level falls
below a specified threshold, it can be inferred that
● To decide which image corresponds to the
the algorithm has successfully identified the object.
input image, we simply compare two histograms
7. Training: Use a machine learning algorithm
and return the image with the closest histogram.
to train a model using the labeled face images and
● To compare histograms and calculate the their corresponding LBPH feature histograms. This
dissimilarity between them, various techniques can step involves feeding the extracted features into
be utilized such as Euclidean distance, chi-square, the chosen classifier and optimizing its parameters
absolute value etc. using a training procedure. Because we're trying to
figure out how many times each pixel intensity
● In our case we have employed the widely appears in a grayscale image, each grid's histogram
recognized Euclidean distance method based on the includes 256 bins ranging from 0 to 255. Each
following calculation: histogram represents a single image from the
training dataset. As a result, in response to an input
image, we repeat the operation for this new
picture, resulting in an image represented by a
histogram that can be compared to other
histograms. By comparing histograms, we may find
the image that most closely reflects the input
As a result, the programme returns the
image. Using a threshold and the "confidence"
image ID corresponding to the histogram that is
number, the algorithm's accuracy in detecting the
closest. Furthermore, the process should return the
image may then be determined.
201
Vol 44 No. 7
Journal of Harbin Engineering University July 2023
ISSN: 1006-7043
8. Once the model is trained and validated, match the image due to changes in the student's
you can apply it to new images to recognize faces face, such as: B. Cuts, sores, pimples, or if the child
and monitor attendance. For each input image, is missing their RFID-enabled ID card or registered
perform face detection, alignment, and feature cell phone. In such circumstances, the system
extraction. Then, feed the features into the trained collects data from the student through different
model to predict the identity of the detected face. means, such as an RFID card, Ethernet protocol, or
Track the attendance of students based on their another suitable way. The technology monitors
recognized identities. student attendance and reports the data to the
teacher. The information is then verified by the
The face recognition attendance system gets teacher, and the final attendance record is updated
student information using an image matching and permanently kept in the attendance database.
algorithm. However, the system may be unable to
202
Vol 44 No. 7
Journal of Harbin Engineering University July 2023
ISSN: 1006-7043
Patel et al. 2012 RFID Academic A real-time intelligent method for monitoring
student attendance was proposed [17].
Singhal, & Gujral, RFID Academic Implemented a GSM cellular network-based
201 SMS technique for BF remote monitoring
attendance [18].
Saparkhojayev & RFID Academic Presented an RFID-based attendance system
Gaverein,20 at Kazakhstan's Suleyman Demirel University
[19].
Benyo et al., 2012 NFC Academic Introduced and created a self-contained
student attendance system using NFC [20].
Chiagozie, & RFID Academic & Proposed an RFID-based door unit for a time-
Nwaji, 2012 Organization attendance control system [21].
Talaviya et al., Fingerprint-Zigbee Academic A mobile attendance system was created to
2013 precisely track and record student
attendance in classes using fingerprint
technology and a GSM network. Additionally,
the system facilitates the transfer of
attendance records to parents via a GSM-
based mobile network [22].
Behara & Face recognition Organization Proposed an automated system for managing
Raghunadh, 2013 and monitoring attendance in a real-time
setting to record time and attendance
applications based on biometric facial
recognition [23].
Baban 2014 QR Code Academic Presented a student attendance system that
uses a QR code that cellphones can scan to
record, display, monitor, and check
attendance data. [24]
Yadav & Nainan, RFID-GSM Academic Using GSM to notify parents, an automated
2014 attendance management system is given for
students and instructors [25].
PVN & Gupta, Fingerprint-GSM Academic Proposed an attendance system to
203
Vol 4o. 7
Journal of Harbin Engineering University July 2023
ISSN: 1006-7043
Yuru et al., 2013 RFID Academic Designed a system for tracking student
attendance in the classroom using embedded
ARM and RFID technologies [31].
Hui et al. 2014 Mobile Based Academic A mobile-centric attendance system that
tracks student attendance by using
smartphone location data was developed and
built [32].
204
Vol 4o. 7
Journal of Harbin Engineering University July 2023
ISSN: 1006-7043
205
Vol 4o. 7
Journal of Harbin Engineering University July 2023
ISSN: 1006-7043
22. Talaviya, A., (2013). Conducted a portable constructed an attendance tracking and
attendance system utilizing a fingerprint-based management system that was both secure and
GSM network to track and record a student's portable. Journal of Organizational Research,
attendance in class and transmit a record to the 19(2), 56-72.
student's parents using a GSM-based mobile 31. Yuru, Z., Delong, C., & Liping, T. (2013). The
network. Journal of Academic Research, 9(2), 45- research and application of college student
60. attendance system based on RFID
23. Behara, P., & Raghunadh, K. (2013). Proposed an technology. International Journal of Control and
automated system for managing and monitoring Automation, 6(2), 273-282.
attendance in a real-time setting to record time 32. Yuru, Z., Delong, C., & Liping, T. (2013). The
and attendance applications based on biometric research and application of college student
facial recognition. Journal of Organizational attendance system based on RFID technology.
Research, 18(3), 87-102. International Journal of Control and Automation,
24. Baban, M. (2014). Presented a student 6(2), 273-282
attendance system that uses a QR code that
cellphones can scan to record, display, monitor,
and check attendance data. Journal of Academic
Research, 10(4), 112-126.
25. Yadav, A., & Nainan, S. (2014). Using GSM to
notify parents, an automated attendance
management system is given for students and
instructors. Journal of Academic Research, 10(4),
90-105.
26. PVN & Gupta, S. (2013). Proposed an attendance
system to automatically track and control
student attendance in the lab using an RFID-
ARDUINO method in settings with web-based
lobotomies. Journal of Academic Research, 9(3),
45-62.
27. Arbain et al., Rahman, M., & Kim, S. (2014). Used
a GPRS-based student attendance system that
lectures may simply access over the web to
verify and monitor student attendance data.
Journal of Academic Research, 10(1), 32-48.
28. Tiwari, S., Patel, A., & Gupta, R. (2014). Based on
biometric fingerprint-based and Zigbee
technology, a wireless attendance monitoring
system has been suggested to autonomously
maintain, manage, and record student
attendance at a university establishment. Journal
of Academic Research, 10(3), 78-92.
29. Kurniali, T. (2014). Developed a web-based
system for controlling students' attendance in a
higher education institution in Indonesia by
combining RFID technology. Journal of Academic
Research, 10(4), 108-122.
30. Zainal et al., Lee, J., & Kumar, S. (2014). By
integrating biometric fingerprint technology and
an Arduino microcontroller, the authors
206