Vous êtes sur la page 1sur 25

A SUMMER TRAINING PRESENTATION

on
FACE RECOGNISATION SYSTEM
Submitted for partial fulfillment of the degree of
Bachelor of Technology
In
Computer Science & Engineering

G.L Bajaj Group Of Institutions, Mathura

Submitted To:- Submitted By:-


Er. Brijesh Gupta Mukund Varshney
Assistant Professor B.Tech(CSE) 4th Year
G.L. Bajaj, Mathura Roll No:-1451110017
Table of Contents
 Company Profile
 Introduction Of Project
 Objective Of Project
 Problem in Present System
 Existing System
 Feasibility Study
 Hardware and Software Requirements
 Process Flow Diagram
 Data Flow Diagram
 Screenshots
 Result
 Conclusion
Company Profile
Company Name: : Annapurna Compued Private Limited
Status: : Active
Category : Private Company limited
Company Age : 21 Years
Director : Amit Kumar Sharma
Location : Mathura, Uttar Pradesh
No of Employes : 40-50 Employes
Services : Software Development & Marketing
Introduction of Project
•This project is a step towards developing a face
recognition system which can recognize static images.

•The Face Detection will locate faces in a given image


and separate them from the scene.

•The Face Recognition System will recognize faces


provided by the detection module.

•It will use the Eigenfaces algorithm for recognition


Objective of Project
 Develope a computational model.
 Why face recognition?
To apply it to wide area of problems.
1)Criminal Identification
2)Security
3)Image and Film Processing
Problem in Present System
 Present System takes much time to find any criminals.
 Not very much accurate.
 Danger of losing the files in some case.
 Present System is not perfect and struggles to perform
under certain conditions :-
1. Poor Lighting
2. Low Resolution Images.
3. It is not platform independent
Existing System
The features of existing system are described below:-

1. Every user must have user name and password for using
the system.
2. After correctly entering the user id and password a new
screen will be opened for the user according to their
privileges.
3. After entering the wrong user id and password this will
be give message as a dialog box.
4. Different users have different privileges.
5. There must be only three tries possible for the user id and
password.
Feasibility Study
This system is feasible,
Technically:- Platform independent and faster
access of database over network.

Economically:- Open Source Software, free of


cost.

Operationally:- Comfortable browsing and more


information with a few mouse clicks.
Hardware Requirements
 Processor : Processor with 400 Mhz.
 Hard disk : 500 GB hard disk.
 RAM : 4 GB

Software Requirements
 Language : Java
 Operating System : Windows
 Database : MySQL
 Design : Swing, AWT
Process Flow Diagram:
Start

Login

Authentication

Valid User
Invalid User

Main Screen

Add Image Clip Image Update Details Construct Image Search Process

Enter Make Clips Open Record Specify Feature


Search Image &
Details & Update
Get Details

Add to Add Clips to Add to Search Result


Database Database database Image

End
Data Flow Diagram(Level 1)
Login Process DFD

PROCESS
LOGIN SCREEN

ERROR IN
INPUT

LEVEL-0
Main Screen Process DFD

MAIN
OPERATOR SCREEN ADD IMAGE

SEARCH
IMAGE

CLIP IMAGE

CONSTRUCT
IMAGE

LEVEL-1
Clipping Process
Screenshot
Face Identification Main Screen: LOGIN
Screenshot
Face Identification Main Screen: File
Screenshot
Face Identification Main Screen: File
Screenshot
Face Identification Main Screen: File
Screenshot
Face Identification Main Screen: File
Screenshot
Face Identification Main Screen: EDIT
Screenshot
Face Identification Main Screen: IDENTIFICATION
Screenshot
Face Identification Main Screen: IDENTIFICATION
Result

 Thus we have reduced the problem of matching faces


with previous applications.

 This application will find the approximate match of


human face at various angles.
Conclusion
 A face recognition system must be able to recognize a
face in many different imaging situations.

 It will find faces efficiently without exhaustively


searching the image.

 Face recognition systems are going to have


widespread application in smart environments.

.
Thank You

Vous aimerez peut-être aussi