Electronic time clock: Development of a facial recognition system to control the I.T. trainees at SEJUSC

  • Adison Praia Bachelor in Computer Science, Universidade Paulista - UNIP. Manaus-Amazonas, Brazil http://orcid.org/0000-0003-1103-0558
  • Jussara Branches Bachelor in Computer Science, Universidade Paulista - UNIP. Manaus-Amazonas, Brazil http://orcid.org/0000-0002-9630-6826
  • Sildoney Andrade Bachelor in Computer Science, Universidade Paulista - UNIP. Manaus-Amazonas, Brazil http://orcid.org/0000-0001-6560-7565
  • Eliton Smith Research in Postgraduate Program in Engineering, Process Management, Systems and Environmental (PPEPMSE) - Institute of Technology and Education Galileo of the Amazon – ITEGAM http://orcid.org/0000-0002-8039-7532
  • Alexandra Amaro de Lima Research in Postgraduate Program in Engineering, Process Management, Systems and Environmental (PPEPMSE) - Institute of Technology and Education Galileo of the Amazon – ITEGAM http://orcid.org/0000-0003-3918-0013

Abstract

The article reports the development of an electronic time clock with facial recognition aimed at Information Technology trainees of the State Department of Justice, Human Rights and Citizenship. This is a device in which it is possible to register the clock-in and clock-out schedules, and in addition, it is possible to check the overtime report where the sector supervisor can offer these hours as days off. Given the deficiencies found in the sector, one being the frequency control that was still being done manually and the other, the high demand for work with the need to work overtime, the theme was developed. The importance of the system is that it makes the dynamics of the working day more automated and optimized. In its creation, the methodology of research, interviews, and data collection was adopted, as well as technological tools such as Biometrics, Programming Language, and Database. After the development and tests, it was possible to implement the electronic time clock in the sector. It was found that with low cost technologies available and with the ease of access to information it was possible to solve the problems of the sector of an organization.

Downloads

Download data is not yet available.

References

J. de J. Lozoya-Santos, V. Sepúlveda-Arróniz, J. C. Tudon-Martinez, and R. A. Ramirez-Mendoza, “Survey on biometry for cognitive automotive systems,” Cognitive Systems Research, vol. 55, pp. 175–191, Jun. 2019, doi: 10.1016/j.cogsys.2019.01.007.

A. F. de Moraes, Segurança em redes: Fundamentos: Fundamentos, 1ª edição. Editora Érica, 2010.

J. L. D. Moraes, “Controle de Acesso Baseado em Biometria Facial,” p. 102, 2010. doi: http://repositorio.ufes.br/handle/10/4231.

A. K. Jain, A. Ross, and S. Prabhakar, “An introduction to biometric recognition,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 14, no. 1, pp. 4–20, Jan. 2004, doi: 10.1109/TCSVT.2003.818349.

R. D. Labati, A. Genovese, E. Muñoz, V. Piuri, F. Scotti, and G. Sforza, “Computational Intelligence for Biometric Applications: a Survey,” International Journal of Computing, pp. 40–49, Mar. 2016, doi: 10.47839/ijc.15.1.829.

J. Buolamwini, V. Ordóñez, J. Morgenstern, and E. L. Miller, “Facial Recognition Technologies In The WILD,” Ajl.org, 2022. [Online]. Available: https://www.ajl.org/federal-office-call (accessed Abr. 17, 2022).

M. G. Galterio, S. A. Shavit, and T. Hayajneh, “A Review of Facial Biometrics Security for Smart Devices,” Computers, vol. 7, no. 3, Art. no. 3, Sep. 2018, doi: 10.3390/computers7030037.

P. M. P. Reis, “Identificação, análise e avaliação de linguagens de programação adequadas ao desenvolvimento de agentes móveis multi-plataforma,” Ipleiria.pt, 2014, doi: http://hdl.handle.net/10400.8/1357.

H. Özmen. “Python Lecture Notes”. p.2, 2022. [Online]. Available: https://www.academia.edu/49678628/PYTHON_PROGRAMMING_LANGUAGE (accessed May 06, 2022).

M. G. Rashed and R. Ahsan, “Python in Computational Science: Applications and Possibilities,” International Journal of Computer Applications, vol. 46, no. 20, pp. 26–30, May 2012.

W. Zhao, R. Chellappa, P. J. Phillips, and A. Rosenfeld, “Face recognition: A literature survey,” ACM Comput. Surv., vol. 35, no. 4, pp. 399–458, Dec. 2003, doi: 10.1145/954339.954342.

“Home,” OpenCV. [Online]. Available: https://opencv.org/ (accessed May 06, 2022).

M. Marengoni and S. Stringhini, “Tutorial: Introdução à Visão Computacional usando OpenCV,” Revista de Informática Teórica e Aplicada, vol. 16, no. 1, Art. no. 1, 2009, doi: 10.22456/2175-2745.11477.

G. Bradski and A. Kaehler, Learning OpenCV: Computer Vision with the OpenCV Library. O’Reilly Media, Inc., 2008.

J. Medeiros, Y. Alencar Lima, e E. De Macedo Rodrigues, “Comparação De Ferramentas De Modelagem De Banco De Dados: Open Source”, SIEPE, vol. 10, nº 2, mar. 2020.

“Relacionamento 1-1, 1-N e N-N com Django,” Treinaweb.com.br, 2022. [Online]. Available: https://www.treinaweb.com.br/blog/relacionamento-1-1-1-n-e-n-n-com-django (accessed Sep. 22, 2022).

J. C. Cantú, “Sistema para controle de ponto de funcionários,” Utfpr.edu.br, 2011, doi: http://repositorio.utfpr.edu.br/jspui/handle/1/15549.

J. M. Pinheiro, Biometria nos Sistemas Computacionais: Você é a Senha. Rio de Janeiro: Editora Ciência Moderna Ltda, 2008.

M. C. D. Assis. Metodologia do Trabalho Cientifico. In: Evangelina Maria B. de Faria: Ana Cristina 5. Aldrigue. (Org). Linguagens: usos e reflexões, 3. Ed. João Pessoa Editora Universitária UFPB. 2009.

SEJUSC, Secretaria de Estado de Justiça, Direitos Humanos e Cidadania. 2022. Accessed in: June 2022. Available in: http://www.sejusc.am.gov.br/

A. S. Lima, Uml 2, 0 do Requisito a Solução. Erica, 2008.

M. T. and Inovation, “Design Thinking - Inovação em Negócios”. [Online]. Available: https://www.livrodesignthinking.com.br (accessed Oct. 14, 2022).

J. Otávio, “Tkinter: Interfaces gráficas em Python,” DevMedia, 2016. [Online]. Available: https://www.devmedia.com.br/tkinter-interfaces-graficas-em-python/33956 (accessed Oct. 14, 2022).

R. Python, “Python and MySQL Database: A Practical Introduction – Real Python.”. [Online]. Available: https://realpython.com/python-mysql/ (accessed Aug. 07, 2022).

“Módulo de sistema operacional em Python com exemplos – Acervo Lima”. [Online]. Available: https://acervolima.com/modulo-de-sistema-operacional-em-python-com-exemplos/ (accessed Sep. 15, 2022).

“Numpy Python: O que é, vantagens e tutorial inicial - Blog - Harve”. [Online]. Available: https://harve.com.br/blog/programacao-python-blog/numpy-python-o-que-e-vantagens-e-tutorial-inicial/ (accessed Oct. 04, 2022).

G. Santos, “Como Manipular Datetime no Python,” Data Hackers, Oct. 08, 2021. [Online]. Available: https://medium.com/data-hackers/como-manipular-datetime-no-python-578f07b72920 (accessed Oct. 10, 2022).

“email.message: Representing an email message — Python 3.11.0 documentation”. [Online]. Available: Python.org, 2022. https://docs.python.org/3/library/email.message.html (accessed Sep. 24, 2022).

AsttroDev, “TUTORIAL: Enviando e-mail utilizando a biblioteca SMTPLib do Python,” Medium, Jun 17, 2018. [Online]. Available: https://medium.com/@asttrodev/tutorial-enviando-e-mail-utilizando-a-biblioteca-smtplib-do-python-2adfb3768a08 (accessed Oct. 14, 2022).

Published
2022-12-31
How to Cite
Praia, A., Branches, J., Andrade, S., Smith, E., & Lima, A. (2022). Electronic time clock: Development of a facial recognition system to control the I.T. trainees at SEJUSC. ITEGAM-JETIA, 8(38), 24-36. https://doi.org/10.5935/jetia.v8i38.841
Section
Articles