Presentation is loading. Please wait.

Presentation is loading. Please wait.

Submitted by: Siddharth Jain (08EJCIT075) Shirin Saluja (08EJCIT071) Shweta Sharma (08EJCIT074) VIII Semester, I.T Department Submitted to: Mr. Abhay Kumar.

Similar presentations


Presentation on theme: "Submitted by: Siddharth Jain (08EJCIT075) Shirin Saluja (08EJCIT071) Shweta Sharma (08EJCIT074) VIII Semester, I.T Department Submitted to: Mr. Abhay Kumar."— Presentation transcript:

1 Submitted by: Siddharth Jain (08EJCIT075) Shirin Saluja (08EJCIT071) Shweta Sharma (08EJCIT074) VIII Semester, I.T Department Submitted to: Mr. Abhay Kumar Lecturer Department of I.T

2 Contents Introduction Requirements Analysis Feasibility Study System Design Testing and Test Plans System Implementation Maintenance Snapshots

3 Introduction A Facial Recognition System is a computer application for automatically identifying or verifying a person from a digital image or a video frame from a video source. One of the ways to do this is by “Comparing selected facial features from image and a facial database”. Swiss European surveillance: facial recognition and vehicle make, model, color and license plate reader

4 Facial recognition systems are computer-based security systems that are able to automatically detect and identify human faces. These systems depend on a recognition algorithm, such as eigenface or the hidden Markov model. The system measures nodal points on the face, such as the distance between the eyes, the shape of the cheekbones and other distinguishable features. These nodal points are then compared to the nodal points computed from a database of pictures in order to find a match.

5 Two of the most popular techniques for dimensionality reduction are: Principal Component Analysis (PCA). Linear Discriminant Analysis (LDA) Algorithm used in our project is Laplacian Algorithm.

6 Requirement Analysis Users requirements are gathered. SRS document is prepared. Functional requirements are to be considered. Hardware and Software requirements are to be considered.

7 Feasibility Study Feasibility Study is done so that an ill-conceived system is recognized early in definition phase. This phase is really important as before starting with the real work of building the system, it was very important to find out whether the idea thought is possible or not. After doing analysis, we came to conclusion that our project was feasible.

8 System Design System design is the process of developing specifications for a candidate system that meets the criteria established in the system analysis. Major step in System Design is the preparation of the input forms and the output reports in a form applicable to the user. The main aim of the System Design is to make the system user friendly.

9 Schema Design RELATIONAL MODEL: Certain rules are followed in creating and relating database in relational database. This governs how to relate data and prevent data redundancy in the databases. The first set of rules called relational rules ensure that the database is a relational database. The second is called the normalization rule simplifies the database and reduce the redundancy of data.

10 System Environment The front end is designed and executed with the J2SDK1.6.0 User interface using Swing component The features of Java as follows: Core java contains the concepts like Exception handling, Multithreading; Streams can be well utilized in the project environment. The Exception handling can be done with predefined exception Garbage collection automatically, so that it is very secure in memory management.

11 Testing and Test Plans VALIDATION CHECKS: It can be performed by any piece of the software. If the user tries to do unauthorized operations, the appropriate error message is generated by the system. METHODS OF VALIDATION: 1. Presence Check: Checks that data has been entered into the field and it has not been left blank.

12 2. Type Checks: Checks that an entered value is of particular type. E.g. checks that a field is varchar2, number etc. 3. Length Checks: Checks that an entered value is no longer than a particular number of characters. 4. Format Checks: Checks that an entered value is of a particular format. E.g. date format must be “mm-dd-yy” format.

13 Software testing is usually performed for one of two reasons: Defect detection Reliability estimation. Software Testing contains two types of testing: White Box Testing Black Box Testing

14 Input Design Link between the information system and the user. The activity of putting data into the computer for processing can be achieved by instructing the computer to read data from a written or printed document or it can occur by having people key data directly into the system.

15 Project modules Registration Click Photo: Take picture from webcam that will automatically store in database. Text Search: Searching of user’s profile is done by either with ID or User’s name. Image Search: Search image of the user done by matching the given image from that present in database. Take input as picture of the user. Face Recognition: Recognizes user’s face to verify if valid user or not. This is done by taking picture of the user from the webcam and matches it with database pictures.

16 Output Design Output Design is a process that involves designing necessary outputs that should be given to various users according to their requirements. Efficient, Intelligible output design should improve the system’s relationship with the user and help in decision making. Output Design should be designed with utmost care, and the details in the reports must be simple, descriptive and clear to the user.

17 Maintenance Maintenance or Enhancement can be classified as: Corrective Adaptive Perfective Corrective maintenance means repairing, processing or performance failures or making changes because of previously uncorrected problems or false assumptions.

18 Adaptive maintenance means changing the program functions. Perfective maintenance means enhancing the performance or modifying the program to respond to user’s additional or changing needs. Maintenance is costly. One way to reduce the cost is through maintenance management and software modification audits.

19 Applications Various applications of Face Recognition are: Document control (digital chip in passports, drivers' licenses) Transactional authentication (credit cards, atms, point-of-sale) Computer security (user access verification) Physical access control (smart doors) Voter registration (election accuracy) Time and attendance (entry and exit verification) Biometric Authentication Systems.

20 Forms Designed Home Page form Admin home page Registration form Image Search form Face recognition form Text search form Click photo form

21 Snapshots

22

23

24

25

26


Download ppt "Submitted by: Siddharth Jain (08EJCIT075) Shirin Saluja (08EJCIT071) Shweta Sharma (08EJCIT074) VIII Semester, I.T Department Submitted to: Mr. Abhay Kumar."

Similar presentations


Ads by Google