STUDENT VIRTUAL CLASS ATTENDANCE BASED ON FACE RECOGNITION USING CNN MODEL

https://doi.org/10.22146/ijccs.95824

Dian Nursantika(1), Erna Piantari(2*), Dwi Fitria Al Huseani(3), Dwi Novia Al Husaeni(4), Mushfani Ainul Urwah(5)

(1) Information System, Universitas Terbuka
(2) Computer Science Education, Universitas Pendidikan Indonesia
(3) Computer Science Education, Universitas Pendidikan Indonesia
(4) Computer Science Education, Universitas Pendidikan Indonesia
(5) Computer Science Education, Universitas Pendidikan Indonesia
(*) Corresponding Author

Abstract


Attendance records are an important tool that can be used to include and broadcast member participation in an activity, including the learning process. In online learning classrooms, the process of recording attendance becomes challenging to do manually, thus an automatic attendance recording system is needed. The authentication process is important in developing an existing recording system to guarantee the correctness of the recorded data. In this research, a face authentication system was built to create a system for recording online class attendance to help integrate participant activities and participation in online class learning. The face recognition approach uses a Convolutional Neural Network (CNN) model specifically designed to automate student attendance in virtual classes. Student image data is taken from virtual classroom sessions and used to train a CNN model. This model can recognize and verify student identity in various lighting conditions and head positions. This research consists of several stages, namely data collection, artificial neural networks, use of facial recognition, dataset application stage, and facial recognition in video frames. The experimental results showed that there were 11193 samples studied and of these 11193 samples the distribution was even, namely 6.7%. In addition, the model performance results show an accuracy of 76.28%.



Keywords


Attendance system; Face recognition;CNN; virtual smart classroom

Full Text:

PDF


References

Kamolbhan Olapiriyakul and J. M. Scher, “A guide to establishing hybrid learning courses: Employing information technology to create a new learning experience, and a case study,” Internet and Higher Education, vol. 9, no. 4, pp. 287–301, Oct. 2006, doi: https://doi.org/10.1016/j.iheduc.2006.08.001. [2] N. Clarke, S. Karatzouni, and S. Furnell, “Transparent Facial Recognition for Mobile Devices.” Accessed: Oct. 24, 2023. [Online]. Available: https://citeseerx.ist.psu.edu/document?repid=rep1&type=pdf&doi=7a55b71c709bab32aeb06c4d16ca45454617fb1a [3] S. Chen, A. Pande, and P. Mohapatra, “Sensor-assisted facial recognition | Proceedings of the 12th annual international conference on Mobile systems, applications, and services,” ACM Conferences, pp 1109-1222, 2014. [4] Q. Zhao and M. Ye, “The application and implementation of face recognition in authentication system for distance education,” May 2010, doi: https://doi.org/10.1109/icnds.2010.5479246. [5] S. Vignesh, K. Priya, and S. S. Channappayya, “Face image quality assessment for face selection in surveillance video using convolutional neural networks,” pp. 577-581, Dec. 2015, doi: https://doi.org/10.1109/globalsip.2015.7418261. [6] P. Sharma, P. Singh, and W. Ghai, “Performance analysis of deep learning CNN models for disease detection in plants using image segmentation,” Information Processing in Agriculture, vol. 7, no. 4, pp. 566–574, Dec. 2020, doi: https://doi.org/10.1016/j.inpa.2019.11.001. [7] T. Hussain et al., “Internet of Things with Deep Learning-Based Face Recognition Approach for Authentication in Control Medical Systems,” Computational and Mathematical Methods in Medicine, vol. 2022, pp. 1–17, Feb. 2022, doi: https://doi.org/10.1155/2022/5137513. [8] I. Castiglioni et al., “AI applications to medical images: From machine learning to deep learning,” Physica Medica, vol. 83, pp. 9–24, Mar. 2021, doi: https://doi.org/10.1016/j.ejmp.2021.02.006. [9] N. Clarke, S. Karatzouni, and S. Furnell, “Transparent Facial Recognition for Mobile Devices.” Accessed: Oct. 24, 2023. [Online]. Available: https://citeseerx.ist.psu.edu/document?repid=rep1&type=pdf&doi=7a55b71c709bab32aeb06c4d16ca45454617fb1a [10] Muhammad, Nurbaiti Nurbaiti, Nurlaila Nurlaila, Tri, and K. Kamilah, “Face Recognition Login Authentication for Digital Payment Solution at COVID-19 Pandemic,” pp. 48-51, Sep. 2020, doi: https://doi.org/10.1109/ic2ie50715.2020.9274654. [11] S. Chen, A. Pande, and P. Mohapatra, “Sensor-assisted facial recognition | Proceedings of the 12th annual international conference on Mobile systems, applications, and services,” ACM Conferences, pp. 109-122, 2014. [12] Z. Hameed, S. Zahia, Begonya García-Zapirain, A. Cadiñanos, and Ana María Vanegas, “Breast Cancer Histopathology Image Classification Using an Ensemble of Deep Learning Models,” Sensors, vol. 20, no. 16, pp. 4373–4373, Aug. 2020, doi: https://doi.org/10.3390/s20164373. [13] H. Wu, “Introduction to convolutional neural networks. National Key Lab for Novel Software Technology” Neural Networks, vol. 5, no. 23, pp. 459, Nov. 2015, doi: https://doi.org/10.1016/j.neunet.2015.07.007. [14] R. Yamashita, M. Nishio, Richard Kinh Gian, and K. Togashi, “Convolutional neural networks: an overview and application in radiology,” Insights into Imaging, vol. 9, no. 4, pp. 611–629, Jun. 2018, doi: https://doi.org/10.1007/s13244-018-0639-9. [15] R. Chauhan, Kamal Kumar Ghanshala, and R. C. Joshi, “Convolutional Neural Network (CNN) for Image Detection and Recognition,” 2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC), pp. 278-282, Dec. 2018, doi: https://doi.org/10.1109/icsccc.2018.8703316. [16] N. Kar, M. K. Debbarma, A. Saha, A., and D. R. Pal, “Study of implementing automated attendance system using face recognition techniques”, International Journal of Computer and Communication Engineering, vol. 1, no. 2, pp. 100-103. 2012. [17] K. Aravindhan, S. Sangeetha, K. Periyakaruppan, K.P. Keerthana, V. SanjayGiridhar, and V. Shamaladevi, “Design of Attendance Monitoring System Using RFID,” In 2021 7th International Conference on Advanced Computing and Communication Systems (ICACCS), vol 1, pp. 1628-1631, Mar. 2021, doi: https://doi.org/10.1109/icaccs51430.2021.9441704. [18] W. Zhao, R. Chellappa, P. J. Phillips, and A. Rosenfeld, “Face recognition: A literature survey”, ACM computing surveys (CSUR), vol. 35, no. 4, pp. 399-458, 2003. [19] M. Owayjan, Amer Dergham, G. Haber, N. Fakih, A. Hamoush, and E. Abdo, “Face Recognition Security System,” Lecture Notes in Electrical Engineering, pp. 343–348, Nov. 2014, doi: https://doi.org/10.1007/978-3-319-06764-3_42. [20] M. Yang, D. Kriegman, and N. Ahuja, “Detecting faces in images: a survey,” IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 24, no. 1, pp. 34–58, Jan. 2002, doi: https://doi.org/10.1109/34.982883. [21] L. Wolf, Tal Hassner, and Itay Maoz, “Face recognition in unconstrained videos with matched background similarity,” CiteSeer X (The Pennsylvania State University), pp. 529-534, Jun. 2011, doi: https://doi.org/10.1109/cvpr.2011.5995566. [22] F. Battaglia, G. Iannizzotto, and L. L. Bello, “A biometric authentication system based on face recognition and rfid tags,” Mondo Digitale, vol. 13, no. 49, pp. 340-346, 2014. [23] A. Abozaid, Ayman Haggag, H. Kasban, and Mostafa, “Multimodal biometric scheme for human authentication technique based on voice and face recognition fusion,” Multimedia Tools and Applications, vol. 78, no. 12, pp. 16345–16361, Dec. 2018, doi: https://doi.org/10.1007/s11042-018-7012-3. [24] S. J. McKenna and S. Gong, “Non-intrusive person authentication for access control by visual tracking and face recognition,” Springer eBooks, pp. 177–183, Jan. 1997, doi: https://doi.org/10.1007/bfb0015994. [25] Hwang, “Face Recognition System Technologies for Authentication System - A Survey,” Journal of Convergence Society for SMB, vol. 5, no. 3, pp. 9–13, 2015. [26] Maheen Zulfiqar, F. Syed, Muhammad Jaleed Khan, and K. Khurshid, “Deep Face Recognition for Biometric Authentication,” 2019 International Conference on Electrical, Communication, and Computer Engineering (ICECCE), pp. 1-6, Jul. 2019, doi: https://doi.org/10.1109/icecce47252.2019.8940725. [27] F. Battaglia, Giancarlo Iannizzotto, and Lucia Lo Bello, “A Person Authentication System Based on RFID Tags and a Cascade of Face Recognition Algorithms,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 27, no. 8, pp. 1676–1690, Aug. 2017, doi: https://doi.org/10.1109/tcsvt.2016.2527299.



DOI: https://doi.org/10.22146/ijccs.95824

Article Metrics

Abstract views : 557 | views : 572

Refbacks

  • There are currently no refbacks.




Copyright (c) 2024 IJCCS (Indonesian Journal of Computing and Cybernetics Systems)

Creative Commons License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.



Copyright of :
IJCCS (Indonesian Journal of Computing and Cybernetics Systems)
ISSN 1978-1520 (print); ISSN 2460-7258 (online)
is a scientific journal the results of Computing
and Cybernetics Systems
A publication of IndoCEISS.
Gedung S1 Ruang 416 FMIPA UGM, Sekip Utara, Yogyakarta 55281
Fax: +62274 555133
email:ijccs.mipa@ugm.ac.id | http://jurnal.ugm.ac.id/ijccs



View My Stats1
View My Stats2