200170107128
Software Requirement Specification
For
Face Recognition System
Prepared by
Jayvirsinh Sisodiya
200170107128
200170107128
CONTENT:
ABSTRACT
SCOPE
OBJECTIVES
USERCHARACTERISTICS
SOFTWARE AND HARDWARE REQUIREMENTS
FUCTIONAL REQUIREMENTS
NON FUCTIONAL REQUIREMENTS
CONSTRAINTS
ASSUMPTIONS AND DEPENDENCIES
200170107128
Abstract
Face recognition systems are used in practically every industry in this digital age. One of the most widely utilized
biometrics is face recognition. It can be used for security, authentication, and identity, among other things. Despite
its low accuracy relative to iris and fingerprint identification, it is extensively utilized because it is a contactless
and non-invasive technique. Face recognition systems can also be used to track attendance in schools, colleges, and
companies. Because the existing manual attendance system is time consuming and difficult to maintain, this system
intends to create a class attendance system that employs the concept of face recognition. There’s also the possibility
of proxy attendance. As a result, the demand for this system grows. Database development, face detection, face
recognition, and attendance updating are the four steps of this system. The photos of the kids in class are used to
generate the database. Faces are discovered and recognized from the classroom’'s live streaming footage. At the
end of the session, the attendance will be mailed to the appropriate faculty.
Scope
Current Scope
At present, attendance, marking involves manual attendance on the paper sheet by professors and
teachers, but it is a very time-consuming process and chances of proxy are also an issue that arises
in such type of attendance marking. Also, there is an attendance marking system such as RFID
(Radio Frequency Identification), Biometrics etc. But these systems are currently not that popular
in schools and classrooms for students.
Future Scope
Over the years, movies have fixed a futuristic fantasy in our minds that a time will come when
software would be used to recognize people by their faces. A time when our faces will be our ID
cards. With advent of facial recognition technology, that time is already here.
Today, along with drones, AI, facial recognition technology is also defining our millennium. Facial
recognition is a biometric technology used for authentication and examination of individuals by
correlating the facial features from an image with the stored facial database. Face Recognition is
one of the most popular applications of image analysis software and no more considered as a subject
of science fiction. Earlier, this technology was only used for security and surveillance purposes, but
it has safely transitioned to the real world in recent times. Today, companies are pitching facial
recognition software as the future of everything from retail to policing
200170107128
Objectives
There are objectives that specify how the system should work for fulfilling the purpose of
developing it. Below are the objectives of our application.:
It provides language support.
It provides digital Business card.
It provides multiple device
It provides auto synchronization
There is different login for Employee and Admin.
It has every necessary information about admin and employees.
It provides help through tutorial, youtube videos , talk to us
It has live tracking facility.
It will show active and inactive Employees.
It provides Attendance feature in different ways like QR code Attendance, Multiple Punching , Selfie
Attendance …
It provides half day if employee is late.
It Manage Biometric.
It provides Block fake Attendance.
It provides leave Request facilities which can approved by admin.
It provides Holiday list.
It Manage company leaves like casual leave , privileged leave , sick leave.
It provide salary settings , Manage Salary Templates .
It provide reports of company like Attendance , payments , notes in Excel and pdf form.
It provide alerts through SMS and Whatsapp .
200170107128
User Characteristics
Analyzing user characteristics is an important aspect of any project. It allows us to clearly define
and focus on who the end users are for the project. Also, it allows checking the progress of the
project to ensure that we are still developing the system for the end users. The user must have
following characteristics:
User must have basic knowledge of Mobile
User should understand the use of all modules.
User can easily interact with the proposed system.
User must know the technical terms used in the system for performing different tasks specially
related to facial recognition and attendance system.
User should be also being aware about the running process of the system.
Software and Hardware Requirements
Software and Hardware Requirements are used to describe the minimum hardware and software
requirements to run the Software. These requirements are described below.
Software Requirements
Client:
Operating System: Windows or Linux or Android
Python language support
Server:
Operating System: Windows or Linux OS or Android
Database : Oracle
200170107128
Hardware Requirements
Client:
GHz or better processor
512 MB of free RAM
Internet Connection
Camera or Webcam
Mobile Phone
Server:
1.6 GHZCPU
1 GB of RAM
Internet Connection
Monitor
Keyboard/Mouse
Printer
Functional Requirements
The basic features available in the system are as follows:
Faces on an image must be detected.
Compute the total attendance based on detected faces.
Store the cropped faces in a folder.
Train faces for recognition.
Display the name and ID of the output image down the image in the plot area.
200170107128
Non Functional Requirements
Following is a list of non-functional requirements:
Performance:
This system should remain accessible any time. There is an easy recognition for students
and teacher.
Security:
The database of system should have strong password and it can’t access without admin
and system authorized.
Reliability:
It can be accessed by the end users 24*7 as an when needed hence is highly reliable for
end users.
Availability:
Internet connection for the nodes with the database server is ensured and hence the
application will be available any time for access.
Portability:
The developed application is portable as it can be accessed from any operation system
regardless Windows, Mac, Linux, Android, Ios provided they have a browser to access
Internet.
200170107128
Constraints
Parallel Operations
The project is on basis of multi-user. This used for attendance. The Students and Teachers
can see their reports on monthly bases .
Reliability Requirements
Reliability requirements of the system are one of the prime ones in the list. The system is needed
to be highly reliable in terms of performance and capable of recognition faces .
Criticality of the Application
The system can stop working on phones with very low internet connection. Other than that there
won’t be any issues. Apart from these the system should be able to make updates at regular time
intervals.
Security Consideration
Safety and security too are other major concerns of any system. It is necessary to provide safety
and security as the system is web application and might be intrude by security threats from the
internet. Thus, the code needs to be encrypted and any transaction needs to be done securely.
Hardware Limitations
Hardware Limitations are other constraint of the system. Hardware Limitations should be
overcome for better performance of the system. This can be achieved by using minimum and only
necessary hardware.
200170107128
Regulatory Policies
Regulatory policy is about achieving organization’s objectives through the use of regulations, laws,
and other instruments .Thus the system should be developed by using these regulations to provide
better outcome to the company.
General Constraints
The key restriction here will be to verify the validity of faces, which is not always feasible. Security
threats may be involved.
The built framework can run on any platform (Unix, Linux, Mac, Windows, Android , IOS etc.).
Assumptions and Dependencies
Assumptions
• Database of student and teachers are assumed to be secure and reliable.
• User is the person having enough knowledge for the traversing operation.
• We will provide a user friendly interface so that any user can easily navigate through the system,
but he/she should be capable of providing valid faces for successful login.
• The server used for data storing is always secured.
Dependencies
• The system is dependent upon the user’s valid credentials. If user inputs wrong
username or password, he/she will not be allowed to login to the system.
• This application depends on the server and internet as all the information is collected and
then stored in the server through secure internet connection.