This document describes a school bus tracking and security system that uses face recognition, GPS, and notification technologies. The system uses a camera to identify students as they board and exit the bus. A GPS module tracks the bus location and uploads coordinates to a database. Parents and school administrators can access this information through a mobile app to track students. When a student's face is recognized, a notification is sent to the parents. The system aims to increase student safety by monitoring their locations and notifying parents when they enter or exit the bus.
IRJET- Class Attendance using Face Detection and Recognition with OPENCV
This document describes a system to automate class attendance using face detection and recognition with OpenCV. The system uses the Viola-Jones algorithm for face detection and linear binary pattern histograms for face recognition. Detected faces are converted to grayscale images for better accuracy. The system trains on positive images of faces and negative images without faces to build a classifier. It then detects faces in class and recognizes students by matching features to a stored database, updating attendance and notifying administrators. The proposed system aims to reduce time spent on manual attendance and increase accuracy by automating the process through computer vision techniques.
IRJET- Automation Software for Student Monitoring System
This document proposes and evaluates an automated student monitoring system using various technologies. The system aims to more efficiently track student attendance by automating the process and eliminating issues like proxy attendance. It explores methods like face recognition using parameters like pose, sharpness and brightness. Other approaches examined include voiceprint recognition, RFID tags, and an Android-based system using barcodes and fingerprint sensors. The proposed system would make attendance tracking faster, more accurate, and paperless by automating the process through electronic sensors. It could prevent cheating but may have issues with lighting conditions or noise affecting biometric systems. An evaluation found such a semi-automated system using smartphone Wi-Fi fingerprinting and a k-NN algorithm could provide an inexpensive and effective
Ingerprint based student attendance system with sms alert to parents
Abstract
This paper is a study of a fingerprint recognition system based on minutiae based fingerprint algorithms used in various techniques. This line of track mainly involves extraction of minutiae points from the model fingerprint images and fingerprint matching based on the number of minutiae pairings among two fingerprints. This paper also provides the design method of fingerprint based student attendance with help of GSM. This system ignores the requirement for stationary materials and personnel for keeping of records.
Keywords – GSM, LCD
3D Human Hand Posture Reconstruction Using a Single 2D ImageWaqas Tariq
Passive sensing of the 3D geometric posture of the human hand has been studied extensively over the past decade. However, these research efforts have been hampered by the computational complexity caused by inverse kinematics and 3D reconstruction. In this paper, our objective focuses on 3D hand posture estimation based on a single 2D image with aim of robotic applications. We introduce the human hand model with 27 degrees of freedom (DOFs) and analyze some of its constraints to reduce the DOFs without any significant degradation of performance. A novel algorithm to estimate the 3D hand posture from eight 2D projected feature points is proposed. Experimental results using real images confirm that our algorithm gives good estimates of the 3D hand pose. Keywords: 3D hand posture estimation; Model-based approach; Gesture recognition; human- computer interface; machine vision.
Attendance Monitoring System of Students Based on Biometric and GPS Tracking ...IJAEMSJORNAL
This paper is a study of a fingerprint recognition system based on minutiae based fingerprint algorithms used in various techniques. This line of track mainly involves extraction of minutiae points from the model fingerprint images and fingerprint matching based on the number of minutiae pairings among to fingerprints. This paper also provides the design method of fingerprint based student attendance with help of GSM. This system ignores the requirement for stationary materials and personnel for keeping of records. The main objective of this project is to develop an embedded system, which is used for security applications. The biometrics technology is rapidly progressing and offers attractive opportunities. In recent years, biometric authentication has grown in popularity as a means of personal identification in college administration systems. The prominent biometric methods that may be used for authentication include fingerprint, palmprint, and handprint, face recognition, speech recognition, dental and eye biometrics. In this paper, a microcontroller based prototype of attendance system using fingerprint sensor and face recognition module is implemented. The tracking module is used here to identify the location of the missing person.
MULTIMODAL BIOMETRICS RECOGNITION FROM FACIAL VIDEO VIA DEEP LEARNINGcsandit
Biometrics identification using multiple modalities has attracted the attention of many researchers as it produces more robust and trustworthy results than single modality biometrics.
In this paper, we present a novel multimodal recognition system that trains a Deep Learning Network to automatically learn features after extracting multiple biometric modalities from a single data source, i.e., facial video clips. Utilizing different modalities, i.e., left ear, left profile face, frontal face, right profile face, and right ear, present in the facial video clips, we train supervised denosing autoencoders to automatically extract robust and non-redundant features.The automatically learned features are then used to train modality specific sparse classifiers to perform the multimodal recognition. Experiments conducted on the constrained facial video
dataset (WVU) and the unconstrained facial video dataset (HONDA/UCSD), resulted in a 99.17% and 97.14% rank-1 recognition rates, respectively. The multimodal recognition
accuracy demonstrates the superiority and robustness of the proposed approach irrespective of the illumination, non-planar movement, and pose variations present in the video clips.
IRJET- Class Attendance using Face Detection and Recognition with OPENCVIRJET Journal
This document describes a system to automate class attendance using face detection and recognition with OpenCV. The system uses the Viola-Jones algorithm for face detection and linear binary pattern histograms for face recognition. Detected faces are converted to grayscale images for better accuracy. The system trains on positive images of faces and negative images without faces to build a classifier. It then detects faces in class and recognizes students by matching features to a stored database, updating attendance and notifying administrators. The proposed system aims to reduce time spent on manual attendance and increase accuracy by automating the process through computer vision techniques.
IRJET- Automation Software for Student Monitoring SystemIRJET Journal
This document proposes and evaluates an automated student monitoring system using various technologies. The system aims to more efficiently track student attendance by automating the process and eliminating issues like proxy attendance. It explores methods like face recognition using parameters like pose, sharpness and brightness. Other approaches examined include voiceprint recognition, RFID tags, and an Android-based system using barcodes and fingerprint sensors. The proposed system would make attendance tracking faster, more accurate, and paperless by automating the process through electronic sensors. It could prevent cheating but may have issues with lighting conditions or noise affecting biometric systems. An evaluation found such a semi-automated system using smartphone Wi-Fi fingerprinting and a k-NN algorithm could provide an inexpensive and effective
Ingerprint based student attendance system with sms alert to parentseSAT Journals
Abstract
This paper is a study of a fingerprint recognition system based on minutiae based fingerprint algorithms used in various techniques. This line of track mainly involves extraction of minutiae points from the model fingerprint images and fingerprint matching based on the number of minutiae pairings among two fingerprints. This paper also provides the design method of fingerprint based student attendance with help of GSM. This system ignores the requirement for stationary materials and personnel for keeping of records.
Keywords – GSM, LCD
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Developing Image Processing System for Classification of Indian Multispectral...Sumedha Mishra
This document presents a winter training report submitted by Sumedha Mishra for their B.Tech degree. The report details the development of an image processing system in Java using the open-source ImageJ platform. Plugins were created for ImageJ to implement various unsupervised classification algorithms, including k-means, ISODATA, and fuzzy c-means. These plugins were used to classify very high-resolution multispectral images from sensors like Quickbird, CARTOSAT, WorldView-3, and IKONOS. The goal was pixel-based classification of the satellite images to analyze land use and land cover changes.
UNIVERSITY BUSES ROUTING AND TRACKING SYSTEMijcseit
This paper proposes development of an android app to improve the transportation services for bus rental
companies that lift Taibah University students. It intends to reduce the waiting time for bus students,
thereby to stimulate sharing of updated information between the bus drivers and students. The application
can run only on android devices. It would inform the students about the exact time of arrival and departure
of buses on route. This proposed app would specifically be used by students and drivers of Taibah
University. Any change in the scheduled movement of the buses would be updated in the software. Regular
alerts would be sent in case of delays or cancelation of buses. Bus locations and routes are shown on
dynamic maps using Google maps. The application is designed and tested where the users assured that the
application gives the real time service and it is very helpful for them.
MULTIMODAL BIOMETRICS RECOGNITION FROM FACIAL VIDEO VIA DEEP LEARNINGsipij
Biometrics identification using multiple modalities has attracted the attention of many researchers as it
produces more robust and trustworthy results than single modality biometrics. In this paper, we present a
novel multimodal recognition system that trains a Deep Learning Network to automatically learn features
after extracting multiple biometric modalities from a single data source, i.e., facial video clips. Utilizing
different modalities, i.e., left ear, left profile face, frontal face, right profile face, and right ear, present in
the facial video clips, we train supervised denoising auto-encoders to automatically extract robust and nonredundant
features. The automatically learned features are then used to train modality specific sparse
classifiers to perform the multimodal recognition. Experiments conducted on the constrained facial video
dataset (WVU) and the unconstrained facial video dataset (HONDA/UCSD), resulted in a 99.17% and
97.14% rank-1 recognition rates, respectively. The multimodal recognition accuracy demonstrates the
superiority and robustness of the proposed approach irrespective of the illumination, non-planar
movement, and pose variations present in the video clips.
FUSION BASED MULTIMODAL AUTHENTICATION IN BIOMETRICS USING CONTEXT-SENSITIVE ...cscpconf
Biometrics is one of the primary key concepts of real application domains such as aadhar card, passport, pan card, etc. In such applications user can provide two to three biometrics patterns
like face, finger, palm, signature, iris data, and so on. We considered face and finger patterns
for encoding and then also for verification. Using this data we proposed a novel model for
authentication in multimodal biometrics often called Context-Sensitive Exponent Associative Memory Model (CSEAM). It provides different stages of security for biometrics patterns. In
stage 1, face and finger patterns can be fusion through Principal Component Analysis (PCA), in stage 2 by applying SVD decomposition to generate keys from the fusion data and preprocessed face pattern and then in stage 3, using CSEAM model the generated keys can be encoded. The final key will be stored in the smart cards. In CSEAM model, exponential
kronecker product plays a critical role for encoding and also for verification to verify the chosen samples from the users. This paper discusses by considering realistic biometric data in
terms of time and space
Hand gesture recognition using support vector machinetheijes
1) The document describes a system for hand gesture recognition using support vector machines. It uses Canny's edge detection algorithm and histogram of gradients (HOG) for feature extraction from input images of hand gestures.
2) The system is trained using a dataset of predefined hand gestures. During testing, it compares the features extracted from new input images to those in the training dataset and classifies the gesture using an SVM classifier.
3) Experimental results found the system could accurately recognize 20 different static hand gestures in complex backgrounds. However, the authors note that future work could focus on real-time gesture recognition and reducing complexity for faster processing.
IRJET- Wound Assessment System for Patients with Diabetic Ulcers using Smartp...IRJET Journal
This document describes a smartphone-based wound assessment method for diabetic patients. The method uses a smartphone camera and image capture box to take photos of wounds. Image processing algorithms like mean shift segmentation are then used to analyze the images on the smartphone. This allows wound boundary and color to be determined, providing an assessment of healing status. The system aims to make wound monitoring more convenient and reduce healthcare costs by enabling self-management for patients with diabetic foot ulcers.
Object detection for KRSBI robot soccer using PeleeNet on omnidirectional cameraTELKOMNIKA JOURNAL
Kontes Robot Sepak Bola Indonesia (KRSBI) is an annual event for contestants to compete their design and robot engineering in the field of robot soccer. Each contestant tries to win the match by scoring a goal toward the opponent's goal. In order to score a goal, the robot needs to find the ball, locate the goal, then kick the ball toward goal. We employed an omnidirectional vision camera as a visual sensor for a robot to perceive the object’s information. We calibrated streaming images from the camera to remove the mirror distortion. Furthermore, we deployed PeleeNet as our deep learning model for object detection. We fine-tuned PeleeNet on our dataset generated from our image collection. Our experiment result showed PeleeNet had the potential for deep learning mobile platform in KRSBI as the object detection architecture. It had a perfect combination of memory efficiency, speed and accuracy.
Top Cited Articles International Journal of Computer Science, Engineering and...IJCSEA Journal
International Journal of Computer Science, Engineering and Applications (IJCSEA) is an open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer science, Engineering and Applications. The journal is devoted to the publication of high quality papers on theoretical and practical aspects of computer science, Engineering and Applications.
IRJET- Self-Driving Cars: Automation Testing using Udacity SimulatorIRJET Journal
This document describes a methodology for performing automated testing of self-driving vehicles using the Udacity simulator. The methodology involves collecting training data by manually driving a vehicle in the simulator and recording camera images and steering angles. This data is then augmented and used to train a convolutional neural network model. The trained model is tested by running it autonomously in the simulator on tracks it was and was not trained on. The vehicle is able to navigate both tracks successfully with minimal deviations, demonstrating the methodology can be used to test self-driving vehicles in a safe, automated manner using a simulator.
An Enhanced Authentication System Using Face and Fingerprint Technologiesiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
This document presents a proposed virtual body measurement system to measure body parameters from images in order to select appropriately sized clothing without needing to be physically present. The system uses HAAR features to recognize body parameters like height, waist, bust from images. It then considers factors like fashion style and clothing psychology to enable tailored clothing alterations. The methodology involves using HAAR classifiers and integral images to detect facial features and then train classifiers to recognize other body measurements. This virtual system aims to reduce time spent on physical fittings while shopping for tailored clothing.
IRJET- Advance Driver Assistance System using Artificial IntelligenceIRJET Journal
This document describes an advance driver assistance system using artificial intelligence for vehicle theft prevention. The system uses face detection and recognition techniques to authenticate users before allowing ignition. When a person enters the vehicle, a camera captures their face which is then compared to registered user faces stored in a database. If an unknown user is detected, a text message is sent to the vehicle owner. The owner can then remotely block ignition through the engine control unit, preventing the vehicle from being stolen. The system aims to reduce vehicle thefts using real-time image processing and artificial intelligence for user authentication.
IRJET- Autonamy of Attendence using Face RecognitionIRJET Journal
This document summarizes an automated attendance system using video-based face recognition. The system works by capturing a video of students in a classroom and using face detection and recognition algorithms to identify and mark the attendance of each student. It first detects faces in each video frame using the Haar cascade classifier, then recognizes the faces by comparing them to a training database of student faces using the Eigenfaces algorithm. Finally, it registers the attendance in an Excel sheet. The system aims to make the attendance process more efficient and accurate compared to traditional manual methods.
IRJET- Free & Generic Facial Attendance System using AndroidIRJET Journal
This document proposes a free and generic facial attendance system using Android that can automatically detect students' faces and mark attendance. It uses face detection and recognition algorithms to capture images from a camera and identify students by matching faces to a database. If a face is detected, attendance is marked as present. The system then creates a Google Sheet to store and access attendance records. This provides a low-cost alternative to commercial biometric systems for tracking student attendance.
Self-X: Geo Fencing and Face Recognition based Smart Attendance Management Ap...IRJET Journal
The document describes a proposed smart attendance management application called Self-X that uses geo-fencing and face recognition technologies. It aims to develop a flexible mobile-based attendance system that can optimize and accelerate the attendance process, saving time and resources compared to traditional systems. The proposed system uses geo-fencing to authenticate student locations and a face recognition model to identify students from photos in order to automatically mark attendances. It is intended to address issues like fraudulent attendance faced by previous biometric and barcode-based systems.
IRJET- Intelligent Automated Attendance System based on Facial RecognitionIRJET Journal
This document presents a proposed intelligent automated attendance system based on facial recognition. The system aims to automate the attendance marking process in educational institutions to make it faster and less error-prone compared to manual methods. It works by using computer vision techniques like haar cascade classification for face detection and local binary pattern histograms for face recognition. The system architecture involves capturing images, detecting faces, recognizing students by matching faces to a training database, and marking the attendance automatically. Algorithms like haar cascade and local binary patterns are used for face detection and recognition. The proposed system aims to solve issues with existing manual and automated attendance systems like time consumption, errors, and lack of accuracy.
IRJET - A Review on Face Recognition using Deep Learning AlgorithmIRJET Journal
This document provides an overview of face recognition using deep learning algorithms. It discusses how deep learning approaches like convolutional neural networks (CNNs) have achieved high accuracy in face recognition tasks compared to earlier methods. CNNs can learn discriminative face features from large datasets during training to generalize to new images, handling variations in pose, illumination and expression. The document reviews popular CNN architectures and training approaches for face recognition. It also discusses other traditional face recognition methods like PCA and LDA, and compares their performance to deep learning methods.
IRJET - Augmented Reality: Social Profile Detection by Face RecognitionIRJET Journal
This document discusses using augmented reality and face recognition techniques to display a person's social media profile by analyzing their face. It proposes combining AR and face recognition by developing a device that can recognize a person's social status from their face in a crowd. The document reviews related works using AR for product promotion, education, and shopping applications. It describes existing face recognition and AR display methods, and algorithms like Eigenface and Haar cascade SVM classifier that can be used. The aim is to enhance interaction between users and technology, with applications in criminal detection, disaster management, education and more.
This document proposes a system for identifying, tracking, and controlling car theft using a GPS module, Android mobile phone, and control system. If the car is stolen, the owner will receive an MMS with an image of the thief captured by a hidden camera and SMS messages with the car's latitude and longitude. The owner can then send a secret code by SMS to stop the car remotely via a microcontroller. Principal component analysis is used for face recognition to identify thieves. The low-cost system aims to provide reliable vehicle security and assist investigators in identifying hijackers.
This document describes a facial recognition and biometric security system called Digiyathra that is intended to streamline airport security checks. It would allow passengers to complete check-in, bag drop, and boarding using only their face as identification. During online ticket booking, passengers would submit a passport photo that would be added to a database and used for verification at various points throughout their journey. This system aims to accelerate passenger throughput while reducing costs by minimizing the need for paper-based ID checks. It provides details on how facial recognition works, describing the five main steps of detection, analysis, template generation, matching, and result determination. Local Binary Patterns Histograms are discussed as the specific method used to recognize and identify faces within this
IRJET- Student Attendance System by Face DetectionIRJET Journal
This document describes a student attendance system using face detection and recognition. The system automatically takes attendance by identifying students' faces using image processing techniques. It stores a database of student faces during a training process. When students enter the classroom, the system detects faces in real-time camera footage and compares them to the stored database to identify and mark present any matching students. The system aims to make the attendance process more efficient and accurate compared to traditional manual methods. It provides automated attendance tracking to help monitor student performance without lengthy paperwork.
IRJET- Computerized Attendance System using Face RecognitionIRJET Journal
1. The document describes a computerized attendance system using face recognition for educational institutions. It uses OpenCV with face recognition and detection algorithms like Viola-Jones, PCA, and Eigenfaces.
2. Faces are detected using Viola-Jones algorithm. PCA is used to train detected faces and create a database of known faces. During attendance, faces are compared to the database to identify individuals and mark attendance automatically in an Excel file.
3. This automated system provides benefits over manual attendance systems by saving time, reducing errors, and preventing forgery. It is a more convenient and accurate way to take attendance.
IRJET- Computerized Attendance System using Face RecognitionIRJET Journal
1) The document proposes an automated attendance system using face recognition for educational institutions to replace traditional manual attendance marking.
2) The system uses OpenCV with face detection algorithms like Viola-Jones and PCA to detect faces, create face databases, and compare faces to identities to automatically mark attendance in an excel file.
3) During use, faces will be detected in images from a webcam, compared to stored databases to identify individuals, and their attendance marked electronically without needing physical interaction like ID cards.
IRJET- Vehicle Seat Vacancy Identification using Image Processing TechniqueIRJET Journal
This document summarizes a research paper that proposes a system to identify vehicle seat vacancy using image processing techniques. A webcam installed in a vehicle captures passenger images and sends them to a server via 3G communication. The server then uses face detection algorithms like Viola-Jones, HOG, and CNN to detect and count faces in the images. This allows the system to calculate the vehicle's seat occupancy. The system can also estimate passengers' gender. The proposed system achieves real-time face detection and could help public transportation companies provide better customer service by displaying seat availability information.
Face Recognition based Smart Attendance System Using IoTIRJET Journal
This document describes a face recognition-based smart attendance system using IoT. The system uses a Raspberry Pi connected to a webcam to take pictures of students' faces as they enter the classroom. It then applies face detection and recognition techniques to identify the students and mark them as present in an Excel attendance sheet along with their details. The system aims to automate attendance taking and eliminate issues like proxy attendance. It stores student data and images to create a dataset, which it then uses for real-time face recognition and attendance marking as students' faces are detected by the webcam. The results show this system can accurately and efficiently automate attendance taking in a contactless manner.
IRJET- Face Detection and Tracking Algorithm using Open CV with Raspberry PiIRJET Journal
This document describes a face detection and tracking algorithm using OpenCV with the Raspberry Pi. It discusses using the Haar cascade algorithm for face detection and tracking in real-time video streams from a Pi camera connected to a Raspberry Pi. The algorithm works in two modules - face detection using Haar features and integral images to quickly detect faces, followed by face tracking across subsequent video frames. The algorithm is tested on a Raspberry Pi to enable real-time face detection and tracking applications like security systems.
Visual Saliency Model Using Sift and Comparison of Learning Approachescsandit
This document discusses a study that aims to develop a visual saliency model to predict where humans look in images. It uses the SIFT feature in addition to low, mid, and high-level image features to train machine learning models on an eye-tracking dataset. Support vector machines (SVM) achieved the best performance, accurately predicting fixations 88% of the time. Including the SIFT feature further improved SVM performance to 91% accuracy. The study evaluates different machine learning methods and determines SVM to be best suited for this binary classification task using high-dimensional image data.
A Real Time Advance Automated Attendance System using Face-Net AlgorithmIRJET Journal
This document presents a real-time advanced automated attendance system using the Face-Net algorithm. The system uses facial recognition technology to automate the attendance tracking process. It involves developing facial detection and recognition algorithms, a database to store student information, and interfaces for educators. The system captures images of students' faces and matches them to stored data to record attendance in real-time while maintaining privacy. Testing showed the system could accurately detect and recognize faces in classroom settings. The authors aim to contribute to digitizing education administration and allowing educators to focus on teaching.
An Automatic Attendance System Using Image processingtheijes
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
The papers for publication in The International Journal of Engineering& Science are selected through rigorous peer reviews to ensure originality, timeliness, relevance, and readability.
Person Acquisition and Identification ToolIRJET Journal
The document proposes a facial recognition system using CCTV video to identify individuals and generate timestamp data on their presence. It involves three steps: 1) face detection on video frames, 2) super resolution to standardize face sizes, and 3) face recognition using a Siamese network to identify known and new identities with one-shot learning. The system aims to reduce time spent reviewing surveillance footage for law enforcement. It analyzes existing research on low-resolution face recognition, pedestrian detection, and proposes its pipeline as a solution to semi-automate target individual tracking from video data through facial matching and timestamps.
Virtual Contact Discovery using Facial RecognitionIRJET Journal
The document describes a project that aims to use facial recognition as a means of contact discovery and metadata retrieval. The project seeks to optimize machine learning models for facial detection and verification in order to provide fast and accurate contact matching based on facial encodings. It outlines the objectives, scope, literature review, proposed system architecture and implementation details. The system would take facial landmarks and encodings to compare and rank the top 10 most similar encodings to identify matches from a database. The optimized model aims to reduce latency and improve accuracy for contact matching based on facial scans.
Similar to School Bus Tracking and Security System (20)
This document presents a study that uses linear regression to predict university freshmen's academic performance (GPA) based on their scores on the Joint Matriculation Examination (JME). The study finds a weak positive correlation (R=0.137) between GPA and JME scores, with the regression model only explaining 1.9% of variability in GPA. Statistical tests show no significant relationship between JME score and university GPA (p>0.05). The study concludes that JME score is not a strong predictor of freshmen academic performance.
BigBasket encashing the Demonetisation: A big opportunityIJSRED
1. BigBasket is India's largest online grocery retailer, launched in 2011 when online grocery shopping was still nascent.
2. During India's 2016 demonetization, when cash was scarce, online grocery saw a major boost as consumers turned to sites like BigBasket for contactless digital payments.
3. However, BigBasket faced challenges in meeting consumer expectations for quick delivery while expanding partnerships with local vendors for fresh produce during this surge in demand.
Quantitative and Qualitative Analysis of Plant Leaf DiseaseIJSRED
This document discusses a technique for detecting plant leaf diseases using image processing. It begins with an introduction to plant pathology and the importance of identifying plant diseases. Common plant leaf diseases like Alternaria Alternata, Anthracnose, Bacterial blight, and Cercospora Leaf Spot are described along with their symptoms. The existing methods of disease identification are discussed. The proposed method uses various image processing techniques like filtering, histogram equalization, k-means clustering, and Gray Level Co-occurrence Matrix (GLCM) feature extraction to detect diseases. Image quality is then assessed to identify the affected regions of the leaf.
DC Fast Charger and Battery Management System for Electric VehiclesIJSRED
This document discusses the development of a DC fast charger and battery management system for electric vehicles. It aims to reduce charging times for EVs by designing an efficient charging mechanism. A PIC microcontroller controls the charging voltage and a battery management system monitors battery temperature, voltage, current and provides notifications. The system uses a step-down transformer, rectifier, voltage regulators and temperature sensor to charge lithium-ion batteries safely and quickly, while the battery management system protects the batteries from overcharging or overheating. Faster charging times through more charging stations could encourage greater adoption of electric vehicles.
France has experienced steady economic growth through policies that develop human capital and innovation. It has a highly organized education system that has increased enrollments over time, particularly in tertiary education. France also invests heavily in research and development, ranking highly in patents and innovative organizations. Infrastructure investment has also increased tangible capital stock. Additionally, factors like political stability, rule of law, and low corruption create an environment conducive to business investment and growth. Major events like the French Revolution helped shape France culturally, legally and technologically in ways that still influence its growth path today.
This document describes an acquisition system designed to make the examination process more efficient. The system uses a Raspberry Pi to control various hardware components including an RFID reader, rack and pinion assembly, and motor. It is intended to reduce the time and effort required of staff to distribute exam materials by automating the process. When examiners scan their RFID tags, the system verifies their identity and allows them to retrieve the appropriate exam bundles via a motorized rack and pinion assembly. The goal is to minimize manual labor and speed up exam distribution using an automated hardware and software solution controlled by a Raspberry Pi microcontroller.
Parallelization of Graceful Labeling Using Open MPIJSRED
This document summarizes research on parallelizing the graceful graph labeling problem using OpenMP on multi-core processors. It introduces the concepts of parallelization, multi-core architecture, and OpenMP. An algorithm is designed to parallelize graceful labeling by distributing graph vertices across processor cores. Execution time and speedup are measured for graphs of increasing size, showing improved speedup and reduced time with parallelization. Results show consistent performance gains as graph size increases due to better utilization of the multi-core architecture.
Study of Phenotypic Plasticity of Fruits of Luffa Acutangula Var. AmaraIJSRED
This study examines the phenotypic plasticity of fruits in the plant Luffa acutangula var. amara across different locations in Sindhudurg district, Maharashtra, India. The study found that the plant exhibited plasticity in growth cycle, flowering season, leaf shape, and fruit size depending on location. Maximum fruit weights and sizes were recorded at Talebazar village, while minimum sizes were found at Dahibav village. The variation in fruit morphology is an adaptation to the different environmental conditions at each site.
Understanding Architecture of Internet of ThingsIJSRED
The document discusses the architecture of the Internet of Things (IoT). It begins by introducing IoT and its key components. It then discusses three traditional IoT architectures: (1) a three-layer architecture consisting of a perception, network and application layer; (2) the TCP/IP four-layer model; and (3) the Telecommunications Management Network's five-layer logical layered architecture. The document proposes a new five-layer IoT architecture combining aspects of these models. The five layers are the business, application, processing, transport and perception layers. The perception layer collects data via sensors while the business layer manages the overall enterprise.
This document describes a project report submitted by three students for their bachelor's degree. The report outlines the development of a smart shopping cart system that utilizes RFID and Zigbee technologies. The smart cart is intended to enhance the shopping experience for customers by automatically billing items as they are added to the cart, providing real-time stock levels, and reducing checkout times. The system aims to benefit both customers through a more personalized shopping experience and retailers by improving stock management and reducing shoplifting. The document includes sections on requirements, system design, implementation, results and discussion, and conclusions.
An Emperical Study of Learning How Soft Skills is Essential for Management St...IJSRED
This document discusses an empirical study on the importance of soft skills for management students' careers. It finds that while hard skills and academic performance were once prioritized by employers, soft skills like communication, teamwork, and emotional intelligence are now essential for success. The study surveyed 50 management students and faculty in Bangalore to understand how well soft skills training is incorporated and its benefits. It determined that soft skills like communication are crucial as they influence interactions and job performance. However, older teaching methods do not sufficiently develop these skills. Integrating soft skills training into courses could better prepare students for today's work challenges.
The document describes a proposed smart canteen management system that uses various technologies like a web application, barcode scanner, and thermal printer to automate the food ordering process. The system aims to reduce wait times for students and avoid food wastage by allowing online ordering and monitoring stock. A barcode scanner will be used to identify students during ordering and payment. Thermal printers will generate receipts. The system is expected to reduce workload for staff and provide detailed sales reports for management.
This document discusses Gandhi's concept of trusteeship as an alternative economic system. It summarizes that Gandhi did not distinguish between economics and ethics, and based trusteeship on religious ideas like non-possession and truth as well as Western ideas like stewardship. Trusteeship aimed to persuade wealthy property owners to hold wealth in trust for the benefit of society rather than personal gain. It was meant as a non-violent alternative to capitalism and communism that eliminated class conflict through cooperation and trust between rich and poor. The document provides background on the philosophical and religious influences on Gandhi's views before explaining the key aspects of his theory of trusteeship.
Impacts of a New Spatial Variable on a Black Hole Metric SolutionIJSRED
This document discusses the impacts of introducing a new spatial variable in black hole metrics. It begins by summarizing Einstein and Rosen's 1935 paper which introduced a variable ρ = r - 2M in the Schwarzschild metric to remove the singularity. The document then introduces a similar new variable p = r - 2√M and analyzes how this impacts the Schwarzschild metric. Specifically, it notes that this new variable allows for negative radii values and multiple asymptotic regions beyond just two, introducing concepts of probability and imaginary spatial coordinates. Overall, the document explores how different mathematical variables can impact theoretical physics concepts like wormholes.
A Study to Assess the Effectiveness of Planned Teaching Programme on Knowledg...IJSRED
This document summarizes a study that assessed the effectiveness of a planned teaching program on mothers' knowledge of preventing acute respiratory infections in children under 5. 50 mothers were surveyed before and after the program. Before, 36% had moderate knowledge, 62% had inadequate knowledge, and 2% had adequate knowledge. After, 34% had moderate knowledge, 0% had inadequate knowledge, and 66% had adequate knowledge, showing the program improved mothers' knowledge. The study found no significant association between mothers' knowledge and factors like age, education, or family type.
This document describes a proposed ingenuous Trafalgar contrivition system to improve traffic flow and emergency vehicle access. The system uses embedded technologies like a Raspberry Pi, RF transmitter and receiver, and an Android app. When an emergency vehicle is detected approaching a traffic light, the system will open the lights on its path without disrupting other signals. The app will also help identify hit-and-run vehicles through a brief tracking period. The goal is to reduce traffic congestion and response times to save lives.
This document discusses a proposed system called the Farmer's Analytical Assistant, which aims to help farmers in India maximize crop yields through predictive analysis and recommendations. It analyzes agricultural data on factors like soil properties, rainfall, and past crop performance using machine learning techniques to predict optimal crops for different regions based on the environmental conditions. The proposed system would allow farmers to input local data, receive personalized yield predictions and crop suggestions, and get advice from experts online. The methodology section describes how climate/rainfall and soil data is collected and analyzed using machine learning models to provide crop recommendations. The goal is to improve upon traditional crop selection methods and help increase farmers' incomes.
Functions of Forensic Engineering Investigator in IndiaIJSRED
Forensic engineering involves applying engineering principles and methodologies to answer legal questions, especially regarding accidents and failures. A forensic engineer investigates failures through failure analysis and root cause analysis to determine how and why something failed. The engineer must be familiar with relevant codes and standards, understand eyewitness testimony, apply the scientific method to reconstruct events, and report findings clearly to assist courts. A forensic engineering investigation follows the scientific method to methodically analyze evidence and test hypotheses to determine the cause and circumstances of a failure or accident.
GSM Based Smart Helmet with Sensors for Accident Prevention and Intellectual ...IJSRED
1) The document describes a smart helmet system for motorbike riders that aims to improve safety.
2) The smart helmet contains sensors to detect accidents and whether the rider is wearing the helmet or intoxicated. It can send alerts with location data via GSM if an accident is detected.
3) The system is intended to only allow ignition of the motorbike if the rider is wearing the smart helmet, to encourage helmet usage and prevent accidents. It integrates sensors in the helmet with controls on the motorbike.
Unblocking The Main Thread - Solving ANRs and Frozen FramesSinan KOZAK
In the realm of Android development, the main thread is our stage, but too often, it becomes a battleground where performance issues arise, leading to ANRS, frozen frames, and sluggish Uls. As we strive for excellence in user experience, understanding and optimizing the main thread becomes essential to prevent these common perforrmance bottlenecks. We have strategies and best practices for keeping the main thread uncluttered. We'll examine the root causes of performance issues and techniques for monitoring and improving main thread health as wel as app performance. In this talk, participants will walk away with practical knowledge on enhancing app performance by mastering the main thread. We'll share proven approaches to eliminate real-life ANRS and frozen frames to build apps that deliver butter smooth experience.
Development of Chatbot Using AI/ML Technologiesmaisnampibarel
The rapid advancements in artificial intelligence and natural language processing have significantly transformed human-computer interactions. This thesis presents the design, development, and evaluation of an intelligent chatbot capable of engaging in natural and meaningful conversations with users. The chatbot leverages state-of-the-art deep learning techniques, including transformer-based architectures, to understand and generate human-like responses.
Key contributions of this research include the implementation of a context- aware conversational model that can maintain coherent dialogue over extended interactions. The chatbot's performance is evaluated through both automated metrics and user studies, demonstrating its effectiveness in various applications such as customer service, mental health support, and educational assistance. Additionally, ethical considerations and potential biases in chatbot responses are examined to ensure the responsible deployment of this technology.
The findings of this thesis highlight the potential of intelligent chatbots to enhance user experience and provide valuable insights for future developments in conversational AI.
A brief introduction to quadcopter (drone) working. It provides an overview of flight stability, dynamics, general control system block diagram, and the electronic hardware.
20CDE09- INFORMATION DESIGN
UNIT I INCEPTION OF INFORMATION DESIGN
Introduction and Definition
History of Information Design
Need of Information Design
Types of Information Design
Identifying audience
Defining the audience and their needs
Inclusivity and Visual impairment
Case study.
Exploring Deep Learning Models for Image Recognition: A Comparative Reviewsipij
Image recognition, which comes under Artificial Intelligence (AI) is a critical aspect of computer vision,
enabling computers or other computing devices to identify and categorize objects within images. Among
numerous fields of life, food processing is an important area, in which image processing plays a vital role,
both for producers and consumers. This study focuses on the binary classification of strawberries, where
images are sorted into one of two categories. We Utilized a dataset of strawberry images for this study; we
aim to determine the effectiveness of different models in identifying whether an image contains
strawberries. This research has practical applications in fields such as agriculture and quality control. We
compared various popular deep learning models, including MobileNetV2, Convolutional Neural Networks
(CNN), and DenseNet121, for binary classification of strawberry images. The accuracy achieved by
MobileNetV2 is 96.7%, CNN is 99.8%, and DenseNet121 is 93.6%. Through rigorous testing and analysis,
our results demonstrate that CNN outperforms the other models in this task. In the future, the deep
learning models can be evaluated on a richer and larger number of images (datasets) for better/improved
results.
OCS Training Institute is pleased to co-operate with
a Global provider of Rig Inspection/Audits,
Commission-ing, Compliance & Acceptance as well as
& Engineering for Offshore Drilling Rigs, to deliver
Drilling Rig Inspec-tion Workshops (RIW) which
teaches the inspection & maintenance procedures
required to ensure equipment integrity. Candidates
learn to implement the relevant standards &
understand industry requirements so that they can
verify the condition of a rig’s equipment & improve
safety, thus reducing the number of accidents and
protecting the asset.
Profiling of Cafe Business in Talavera, Nueva Ecija: A Basis for Development ...IJAEMSJORNAL
This study aimed to profile the coffee shops in Talavera, Nueva Ecija, to develop a standardized checklist for aspiring entrepreneurs. The researchers surveyed 10 coffee shop owners in the municipality of Talavera. Through surveys, the researchers delved into the Owner's Demographic, Business details, Financial Requirements, and other requirements needed to consider starting up a coffee shop. Furthermore, through accurate analysis, the data obtained from the coffee shop owners are arranged to derive key insights. By analyzing this data, the study identifies best practices associated with start-up coffee shops’ profitability in Talavera. These findings were translated into a standardized checklist outlining essential procedures including the lists of equipment needed, financial requirements, and the Traditional and Social Media Marketing techniques. This standardized checklist served as a valuable tool for aspiring and existing coffee shop owners in Talavera, streamlining operations, ensuring consistency, and contributing to business success.
Natural Is The Best: Model-Agnostic Code Simplification for Pre-trained Large...YanKing2
Pre-trained Large Language Models (LLM) have achieved remarkable successes in several domains. However, code-oriented LLMs are often heavy in computational complexity, and quadratically with the length of the input code sequence. Toward simplifying the input program of an LLM, the state-of-the-art approach has the strategies to filter the input code tokens based on the attention scores given by the LLM. The decision to simplify the input program should not rely on the attention patterns of an LLM, as these patterns are influenced by both the model architecture and the pre-training dataset. Since the model and dataset are part of the solution domain, not the problem domain where the input program belongs, the outcome may differ when the model is trained on a different dataset. We propose SlimCode, a model-agnostic code simplification solution for LLMs that depends on the nature of input code tokens. As an empirical study on the LLMs including CodeBERT, CodeT5, and GPT-4 for two main tasks: code search and summarization. We reported that 1) the reduction ratio of code has a linear-like relation with the saving ratio on training time, 2) the impact of categorized tokens on code simplification can vary significantly, 3) the impact of categorized tokens on code simplification is task-specific but model-agnostic, and 4) the above findings hold for the paradigm–prompt engineering and interactive in-context learning and this study can save reduce the cost of invoking GPT-4 by 24%per API query. Importantly, SlimCode simplifies the input code with its greedy strategy and can obtain at most 133 times faster than the state-of-the-art technique with a significant improvement. This paper calls for a new direction on code-based, model-agnostic code simplification solutions to further empower LLMs.
Software Engineering and Project Management - Introduction to Project ManagementPrakhyath Rai
Introduction to Project Management: Introduction, Project and Importance of Project Management, Contract Management, Activities Covered by Software Project Management, Plans, Methods and Methodologies, some ways of categorizing Software Projects, Stakeholders, Setting Objectives, Business Case, Project Success and Failure, Management and Management Control, Project Management life cycle, Traditional versus Modern Project Management Practices.
Social media management system project report.pdfKamal Acharya
The project "Social Media Platform in Object-Oriented Modeling" aims to design
and model a robust and scalable social media platform using object-oriented
modeling principles. In the age of digital communication, social media platforms
have become indispensable for connecting people, sharing content, and fostering
online communities. However, their complex nature requires meticulous planning
and organization.This project addresses the challenge of creating a feature-rich and
user-friendly social media platform by applying key object-oriented modeling
concepts. It entails the identification and definition of essential objects such as
"User," "Post," "Comment," and "Notification," each encapsulating specific
attributes and behaviors. Relationships between these objects, such as friendships,
content interactions, and notifications, are meticulously established.The project
emphasizes encapsulation to maintain data integrity, inheritance for shared behaviors
among objects, and polymorphism for flexible content handling. Use case diagrams
depict user interactions, while sequence diagrams showcase the flow of interactions
during critical scenarios. Class diagrams provide an overarching view of the system's
architecture, including classes, attributes, and methods .By undertaking this project,
we aim to create a modular, maintainable, and user-centric social media platform that
adheres to best practices in object-oriented modeling. Such a platform will offer users
a seamless and secure online social experience while facilitating future enhancements
and adaptability to changing user needs.
Conservation of Taksar through Economic RegenerationPriyankaKarn3
This was our 9th Sem Design Studio Project, introduced as Conservation of Taksar Bazar, Bhojpur, an ancient city famous for Taksar- Making Coins. Taksar Bazaar has a civilization of Newars shifted from Patan, with huge socio-economic and cultural significance having a settlement of about 300 years. But in the present scenario, Taksar Bazar has lost its charm and importance, due to various reasons like, migration, unemployment, shift of economic activities to Bhojpur and many more. The scenario was so pityful that when we went to make inventories, take survey and study the site, the people and the context, we barely found any youth of our age! Many houses were vacant, the earthquake devasted and ruined heritages.
Conservation of those heritages, ancient marvels,a nd history was in dire need, so we proposed the Conservation of Taksar through economic regeneration because the lack of economy was the main reason for the people to leave the settlement and the reason for the overall declination.
Conservation of Taksar through Economic Regeneration
School Bus Tracking and Security System
1. Page 1
SCHOOL BUS TRACKING AND SECURITY
SYSTEM
Mr. B. Muthukrishna Vinayagam, M.E.,
(Assistant Professor CSE, Kamaraj college of engineering and technology, Virudhunagar, Tamilnadu, India )
Arunachalam M, Saanmuga kumaar K, Karkuvelayyanar T
(CSE, Kamaraj college of engineering and technology, Virudhunagar, Tamilnadu, India
Email : 16ucse025@kamarajengg.edu.in, 16ucse010@kamarajengg.edu.in, 16ucse005@kamarajengg.edu.in )
----------------------------------------************************----------------------------------
Abstract:
It is important for every school to have a trustworthy and secure transportation service to ensure the safety
of the students. The proposed system provides real time information about various parameters of the
vehicle like the location, the route. In this system, we make use of face recognition and GPS technologies.
GPS module is used to find the current geographic coordinates of the vehicle's location. Camera identifies
each student as they board or alight the vehicle. The information can be accessed by the parents through a
mobile application and school administration this helps them track their wards effectively.
----------------------------------------************************----------------------------------
I. INTRODUCTION
Children security has always been a priority
problem whose solution must constantly be
improved. Children safety is importance to their
parents. Despite the best safety measures, children,
due to their lack of skills to protect them. School
bus plays an essential role in carrying most of
children everyday all over the world. Millions of
children needs to be moved a from home to school
and vice versa every day. For parents, obtaining a
safe transport for their children is a crucial issue.
The commute of students from home to
school and back has always been a source of
concern for parents. Students often get on the
wrong buses and get off at the wrong stops. Bus
drivers may not be able to identify all the students
and will not know in time if a student is missing.
Parents have no way of knowing if their ward is
safe until the evening when the bus returns. The
proposed system describes a low cost
comprehensive school bus monitoring device that
tracks the location.
Real time tracking of the bus allows the
children to have more time for activities instead of
waiting for a delayed bus and the notification
system ensures the individual safety of each student.
The tracking is achieved by reading the geographic
coordinates of the bus from the GPS module and
uploading in to a database. This information can
then be accessed by a user base that includes the
parents, bus drivers and school administration
through a mobile application which takes the
location from the database and plots it on a map.
The notification system alerts the parent when the
face recognition from their child’s face is read by
camera.
II. ARDUINO
Arduino is an open-source platform which is
used to build electronics related projects. It consists
of a microcontroller and software. This Integrated
Development runs on computer which is used to
Write and upload computer code to the physical
board.
2. Page 2
Fig 1.1 Arduino
III. GLOBAL POSITIONING SYSTEM (GPS)
GPS Stands for “Global Positioning
System”. GPS is a satellite navigation system
used to determine the ground position of an
object. GPS technology was first used by the
United States military in the 1960s and expanded
into civilian use over the next few decades.
A Global positioning System is used to find
the location and time information. It display the
latitude and longitude of a particular location
with help of software. This GPS device is
connected to Arduino board. The navigation
devices, GPS receiver obtain the signal from
GPS system
Fig 1.2 GPS module.
IV. Face recognition
The face recognition access control system
has quickly become the mainstream choice for
access control because it is contact-less, user-
friendly, and expandable. FacePass is an upgraded
facial recognition access control module, one that
quickly conducts facial detection, capture,
recognition, and many more functions. A piece of
equipment embedded with the HVC-P2 can detect
and presume attributes and conditions of a user
coming in its vicinity, without the user knowing the
presence of a camera, making it possible to provide
services deemed most suitable in view of the user's
attributes.
Fig 1.3 Camera Module
V. MODULES
A. CAPTURE THE IMAGE
Viola-Jones was designed for frontal faces,
so it is able to detect frontal the best rather than
faces looking sideways, upwards or downwards.
Before detecting a face, the image is converted into
gray scale, since it is easier to work with and there’s
lesser data to process. The Viola-Jones algorithm
first detects the face on the gray scale image and
then finds the location on the colored image. Viola-
Jones outlines a box (as you can see on the right)
and searches for a face within the box. It is
essentially searching for these haar-like features,
which will be explained later. The box moves a step
to the right after going through every tile in the
picture. In this case, I’ve used a large box size and
taken large steps for demonstration, but in general,
you can change the box size and step size according
to your needs. With smaller steps, a number of
boxes detect face-like features (Haar-like features)
and the data of all of those boxes put together, helps
the algorithm determine where the face is.
3. Page 3
Fig 4.1 System diagram
B. TRAIN IMAGE AND STORE
The algorithm shrinks the image to 24 x 24
and looks for the trained features within the image.
It needs a lot of facial image data to be able to see
features in the different and varying forms. That's
why we need to supply lots of facial image data to
the algorithm so it can be trained. Viola and Jones
fed their algorithm 4,960 images (each manually
labeled). For some images, you can feed the mirror
image of a particular image, which would be brand
new information for a computer.
You would also need to supply the
algorithm non-facial images so it can differentiate
between the two classes. Viola and Jones supplied
their algorithm 9,544 non-facial images. Within
these, some images may look similar to features in
a face, but the algorithm will understand which
features are more likely to be on a face and which
features would obviously not be on a face.
C. FACE RECOGNIZE
Viola–Jones algorithm which make it a
good detection algorithm are:
Robust – very high detection rate (true-
positive rate) & very low false-positive rate
always.
Real time – For practical applications at
least 2 frames per second must be processed.
Face detection only (not recognition) - The
goal is to distinguish faces from non-faces
(detection is the first step in the recognition
process).
The algorithm has four stages:
1. Haar Feature Selection
2. Creating an Integral Image
3. Adaboost Training
4. Cascading Classifiers
The features sought by the detection framework
universally involve the sums of image pixels within
rectangular areas. As such, they bear some
resemblance to Haar basis functions, which have
been used previously in the realm of image-based
object detection. However, since the features used
by Viola and Jones all rely on more than one
rectangular area, they are generally more complex.
The figure on the right illustrates the four different
types of features used in the framework. The value
of any given feature is the sum of the pixels within
clear rectangles subtracted from the sum of the
pixels within shaded rectangles. Rectangular
features of this sort are primitive when compared to
alternatives such as steerable filters. Although they
are sensitive to vertical and horizontal features,
their feedback is considerably coarser.
Edge features
Line-features
Four-sided features
Fig 5.2 Face detection
4. Page 4
D. GPS MODULE
The Location object represents a
geographic location which can consist of a latitude,
longitude, time stamp, and other information such
as bearing, altitude and velocity. A Global
positioning System is used to find the location and
time information. It display the latitude and
longitude of a particular location with help of
software. This GPS device is connected to Arduino
board. The navigation devices, GPS receiver obtain
the signal from GPS system.
Fig 5.3 Location Tracking
E. NOTIFICATION
Short Message Service (SMS) is a text
messaging service component of most telephone,
World Wide Web and mobile device systems. It
uses standardized communication protocols to
enable mobile device exchange short text message.
Fig 5.4 Notification.
VI.1 CAPTURE THE IMAGE
Fig 6.1 Get the student information
The fig 8 shows the to get the information for each
student and store the information to CSV (comma-
separated values) file and capture the image for
corresponding student.
VI.2 TRAIN IMAGE AND STORE
Fig 6.2 Train image
Fig 6.3 Trained image
The capture image to be train using
proposed algorithm and store the image. To set the
train image to be labeled then the labeled images
are arranged at sequence and identify the location.
5. Page 5
The train labeled image use to predicate the
unknown label image.
VI.3 Recognize and store
Fig 6.4 Recognize and store
Recognize the face with student id and student
name. To compare the capture face to trained image
and get information for student.
VI.4 STUDENT INFORMATION
Fig 6.5 Student details
Fig 6.6 Student Information
After a successful recognition the student
details are stored in CSV file and sent the location
to their parents.
VI.5 Location Tracking
Fig 6.7 Send the location
Fig 6.8 Location tracking
After adding the address the location sensor
monitor the location using Google Map. When the
correct location is reached the notification is sent to
their parents mobile number. The location address
list are shown in Google map which is represented
above.
VI. CONCLUSIONS
School bus tracking and security system is
to track the school buses and provide relevant
information to their students. The project has
described the design and architecture of school bus
tracking system. The proposed system is
implemented by the use of image processing and
GPS location tracker. The system is able to
demonstrate its performance to track school bus
from any area.
6. Page 6
In future the proposed system can be
improved and extend the application for all the
industries who are all using the transport system.
Some other safety measures in security modules
will be added, The future implementation also adds
the live stream where user can view what is
happening inside the bus.
ACKNOWLEDGMENT
We express a unique pleasure and honorable
thanking our Secretary Thiru. S.P.G.C SRI
MURUGAN, our Principal, Dr. ANANT
ACHARY, M.E, Ph.D., Kamaraj College of
Engineering and Technology for giving an
opportunity to undertake this project work. We
express our immense gratitude to Dr. M. INDRA
DEVI M.E., Ph.D., Head of the Department,
Computer Science and Engineering and Technology
for her encouragement and benevolence in having
offered all facilities and accorded all privileges to
us to bring out this project successfully. We are
greatly indebted to Mr. B. MUTNUKRISHNA
VINAYAGAM, M.E., Assistant Professor,
Department of Computer Science and Engineering,
for his inspiring guidance without which the
project wouldn’t have attained the level of
efficiency it has now. We are indebted to the
Department of Computer Science Engineering as a
whole for extending their helping hands in
completing the project. Last but not least, we would
like to thank our teaching and non- teaching staff
members who spent their valuable time in giving
their ideas during the course of our project. Above
all we are grateful to our beloved parents for their
moral support.
REFERENCES
Briley Kenney. The best GPS Tracking Watches for Kids: Updated for 2016.
Retrieved from http://smartwatches.org/
Barnard, R.W. and Kellogg, C. (2017) “Applications of Convolution
Operators to Problems in Univalent Function Theory”, Michigan Mach,
Vol.27, pp.81–94.
P. Verma, J.S.Bhatia, “Design and Develo Tracking System with Google Map
based Monitoring”, International Journal of Computer Science, Engineering
and Applications (IJCSEA), vol. 3, no. 3, pp. 33-40, 2013.
T. Ahonen, A Hadid, M. Pietikanen, Face Recognition with Local Binary
Patterns. University of Oulu, Finland. 2011.
D. Yi, R. Liu, R.-F. Chu, Z. Lei, and S. Z. Li, “Face matching between near
infrared and visible light images,” in Proc. Int. Conf. Adv. Biometrics, 2014,
pp. 523–530.
Manash Pratim Gohain, Speed Governors, GPS must for school buses,The
Times of India,February 24,2017
Pham Hoang Oat, Micheal Drieberg and Nguyen Chi Cuong ,
Development of Vehicle TrackingSystemusingGPS and GSM Modem ,
2013 IEEE Conference on Open Systems (ICOS), December 2 - 4, 2013,
Sarawak, Malaysia.
Sabira Khanam, Maliha Mahbub, Anuradha Mandal, M. Shamim Kaiser
and Shamim Al Mamun,”Improvement of RFID Tag Detection Using
Smart Antenna For Tag Based School Monitoring System”,International
Conference on Electrical Engineering and Information & Communication
Technology (ICEEICT) 2014.
Pengfei Zhou; Yuanqing Zheng; Mo Li, "How Long to Wait? Predicting
Bus Arrival Time with Mobile PhoneBased
ParticipatorySensing,"MobileComputing,IEEETransactions on, vol.13,
no.6, pp.1228, 1241, June 2014.
P.J. Phillips, H. Moon, S.A. Rizvi and P. J. Rauss, "The FERET Evaluation
Methodology for Face-Recognition Algorithms", IEEE Trans. Pattern
Analysis and Machine Intelligence, vol. 22, no. 10, pp. 1090-1104, Oct. 2010.