0% found this document useful (0 votes)
27 views10 pages

Face Recognition Attendance System SRS

The document is a Software Requirement Specification for a Face Recognition System aimed at automating attendance tracking in educational institutions. It outlines the system's objectives, user characteristics, software and hardware requirements, functional and non-functional requirements, constraints, and assumptions. The system is designed to enhance efficiency and security in attendance management while addressing issues related to manual attendance processes.

Uploaded by

Jay
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
27 views10 pages

Face Recognition Attendance System SRS

The document is a Software Requirement Specification for a Face Recognition System aimed at automating attendance tracking in educational institutions. It outlines the system's objectives, user characteristics, software and hardware requirements, functional and non-functional requirements, constraints, and assumptions. The system is designed to enhance efficiency and security in attendance management while addressing issues related to manual attendance processes.

Uploaded by

Jay
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

200170107128

Software Requirement Specification


For
Face Recognition System

Prepared by

Jayvirsinh Sisodiya

200170107128
200170107128

CONTENT:

 ABSTRACT

 SCOPE

 OBJECTIVES

 USERCHARACTERISTICS

 SOFTWARE AND HARDWARE REQUIREMENTS

 FUCTIONAL REQUIREMENTS

 NON FUCTIONAL REQUIREMENTS

 CONSTRAINTS

 ASSUMPTIONS AND DEPENDENCIES


200170107128

Abstract

Face recognition systems are used in practically every industry in this digital age. One of the most widely utilized
biometrics is face recognition. It can be used for security, authentication, and identity, among other things. Despite
its low accuracy relative to iris and fingerprint identification, it is extensively utilized because it is a contactless
and non-invasive technique. Face recognition systems can also be used to track attendance in schools, colleges, and
companies. Because the existing manual attendance system is time consuming and difficult to maintain, this system
intends to create a class attendance system that employs the concept of face recognition. There’s also the possibility
of proxy attendance. As a result, the demand for this system grows. Database development, face detection, face
recognition, and attendance updating are the four steps of this system. The photos of the kids in class are used to
generate the database. Faces are discovered and recognized from the classroom’'s live streaming footage. At the
end of the session, the attendance will be mailed to the appropriate faculty.

Scope

Current Scope

At present, attendance, marking involves manual attendance on the paper sheet by professors and
teachers, but it is a very time-consuming process and chances of proxy are also an issue that arises
in such type of attendance marking. Also, there is an attendance marking system such as RFID
(Radio Frequency Identification), Biometrics etc. But these systems are currently not that popular
in schools and classrooms for students.

Future Scope
Over the years, movies have fixed a futuristic fantasy in our minds that a time will come when
software would be used to recognize people by their faces. A time when our faces will be our ID
cards. With advent of facial recognition technology, that time is already here.
Today, along with drones, AI, facial recognition technology is also defining our millennium. Facial
recognition is a biometric technology used for authentication and examination of individuals by
correlating the facial features from an image with the stored facial database. Face Recognition is
one of the most popular applications of image analysis software and no more considered as a subject
of science fiction. Earlier, this technology was only used for security and surveillance purposes, but
it has safely transitioned to the real world in recent times. Today, companies are pitching facial
recognition software as the future of everything from retail to policing
200170107128

Objectives

There are objectives that specify how the system should work for fulfilling the purpose of
developing it. Below are the objectives of our application.:

 It provides language support.


 It provides digital Business card.
 It provides multiple device
 It provides auto synchronization

 There is different login for Employee and Admin.


 It has every necessary information about admin and employees.
 It provides help through tutorial, youtube videos , talk to us
 It has live tracking facility.
 It will show active and inactive Employees.
 It provides Attendance feature in different ways like QR code Attendance, Multiple Punching , Selfie
Attendance …
 It provides half day if employee is late.
 It Manage Biometric.
 It provides Block fake Attendance.
 It provides leave Request facilities which can approved by admin.
 It provides Holiday list.
 It Manage company leaves like casual leave , privileged leave , sick leave.
 It provide salary settings , Manage Salary Templates .
 It provide reports of company like Attendance , payments , notes in Excel and pdf form.
 It provide alerts through SMS and Whatsapp .
200170107128

User Characteristics

Analyzing user characteristics is an important aspect of any project. It allows us to clearly define
and focus on who the end users are for the project. Also, it allows checking the progress of the
project to ensure that we are still developing the system for the end users. The user must have
following characteristics:

 User must have basic knowledge of Mobile


 User should understand the use of all modules.
 User can easily interact with the proposed system.
 User must know the technical terms used in the system for performing different tasks specially
related to facial recognition and attendance system.
 User should be also being aware about the running process of the system.

Software and Hardware Requirements

Software and Hardware Requirements are used to describe the minimum hardware and software
requirements to run the Software. These requirements are described below.

Software Requirements

 Client:

 Operating System: Windows or Linux or Android


 Python language support

 Server:

 Operating System: Windows or Linux OS or Android


 Database : Oracle
200170107128

Hardware Requirements

 Client:

 GHz or better processor


 512 MB of free RAM
 Internet Connection
 Camera or Webcam
 Mobile Phone

 Server:

 1.6 GHZCPU
 1 GB of RAM
 Internet Connection
 Monitor
 Keyboard/Mouse
 Printer

Functional Requirements
The basic features available in the system are as follows:
 Faces on an image must be detected.
 Compute the total attendance based on detected faces.
 Store the cropped faces in a folder.
 Train faces for recognition.
 Display the name and ID of the output image down the image in the plot area.
200170107128

Non Functional Requirements

Following is a list of non-functional requirements:

 Performance:
This system should remain accessible any time. There is an easy recognition for students
and teacher.

 Security:
The database of system should have strong password and it can’t access without admin
and system authorized.

 Reliability:
It can be accessed by the end users 24*7 as an when needed hence is highly reliable for
end users.

 Availability:
Internet connection for the nodes with the database server is ensured and hence the
application will be available any time for access.

 Portability:
The developed application is portable as it can be accessed from any operation system
regardless Windows, Mac, Linux, Android, Ios provided they have a browser to access
Internet.
200170107128

Constraints
Parallel Operations

The project is on basis of multi-user. This used for attendance. The Students and Teachers
can see their reports on monthly bases .

Reliability Requirements

Reliability requirements of the system are one of the prime ones in the list. The system is needed
to be highly reliable in terms of performance and capable of recognition faces .

Criticality of the Application

The system can stop working on phones with very low internet connection. Other than that there
won’t be any issues. Apart from these the system should be able to make updates at regular time
intervals.

Security Consideration

Safety and security too are other major concerns of any system. It is necessary to provide safety
and security as the system is web application and might be intrude by security threats from the
internet. Thus, the code needs to be encrypted and any transaction needs to be done securely.

Hardware Limitations

Hardware Limitations are other constraint of the system. Hardware Limitations should be
overcome for better performance of the system. This can be achieved by using minimum and only
necessary hardware.
200170107128

Regulatory Policies

Regulatory policy is about achieving organization’s objectives through the use of regulations, laws,
and other instruments .Thus the system should be developed by using these regulations to provide
better outcome to the company.

General Constraints

The key restriction here will be to verify the validity of faces, which is not always feasible. Security
threats may be involved.

The built framework can run on any platform (Unix, Linux, Mac, Windows, Android , IOS etc.).

Assumptions and Dependencies

Assumptions

• Database of student and teachers are assumed to be secure and reliable.

• User is the person having enough knowledge for the traversing operation.

• We will provide a user friendly interface so that any user can easily navigate through the system,
but he/she should be capable of providing valid faces for successful login.

• The server used for data storing is always secured.

Dependencies

• The system is dependent upon the user’s valid credentials. If user inputs wrong
username or password, he/she will not be allowed to login to the system.
• This application depends on the server and internet as all the information is collected and
then stored in the server through secure internet connection.

You might also like