FACE

This study marks the attendance without human intervention. Face Recognition Time and attendance software systems are tools for efficient management of resources and accurate labor reporting. This study attempts to solve the long queue of the employee in the conventional fingerprint methods and improve the accuracy of attendance information. Database management system has played a role for the normalization of the data flow of the system and assisted the organization of attendance diagrams of the employee \ , thus resulting to a more effective monitoring and attendance recording. To harness full potential in a networked environment, it is recommended to purchase additional face recognition device and immediate implementation of the developed system not only in the CSIT Department but also in SLSU Sogod Campus.


Introduction
In today's networked world, the need to maintain the security of information or physical property is becoming both increasingly important and increasingly difficult.From time to time media of report credit card fraud, computer breakings by hackers or security breaches in a company or government building.In most of crimes today, the criminals are taking advantage of a fundamental flaw in the conventional access control system.None of these means to really define people.Rather, they merely are to authenticate.It goes without saying that if someone steals and duplicates the identity, then an access to a person's data or the personal property any time.Recently, technology became available to allow verification of "true" individual identity based in the field called "biometrics."Nawaz (2009), biometric system had been widely used for the purpose of recognition, in many institutions and organizati .
on The attendance is a very important factor for various purposes and it is one of the important criteria to be followed by employees (Saraswat 2010).The previous manual approach which was manually taking and maintaining the attendance record was very inconvenient.In the olden days, companies are using manual punch card to record the employee's attendance.Findings of the research study conducted (Kelly 1970)

Objectives of the study
The objectives of the study were; 1.To develop a computerized monitoring and attendance system 2. To incorporate Face Recognition technology to the attendance system 3.To design an efficient and effective approach in management decision making.The term 'agile' refers to a philosophy of software specific development.Under this broad umbrella sits many techniques such as Extreme Programming, Scrum, Lean Development, and others.Each of these more particular approaches has ideas, communities and leaders.Agile methods are people-oriented.Agile methods assert that no process will ever make up the skill of the development team, so the role of a process is to support the development team.

Theoretical Framework
In this research, the researcher ai e m to provide a better way of monitoring the attendance of CSIT Department.The system provides a reliable and efficient way of monitoring and record keeping activity as shown in Figure 2. The system needs input, process, and output stages in monitoring and checking attendance.Data and information are important so that the whole system becomes functional.Figure 3 shows the paradigm of the study of the system.

Technical Aspects
The use of face recognition technology eliminates the usage of the buddy punching method and emphasizes on capturing the facial details along with the time.These data are then stored in the database of the computer so that t se he could retrieve anytime.With the usage of the face recognition attendance system, it eliminates the need of a paper register which was in used earlier for recording the attendance along with the time.The unique features that the developed face recognition time monitoring and attendance system are: 1.It is the simplest technology for managing the time related data.

It achieves utmost accuracy in
noting the timing data.3. The easy installation procedure of this system is relatively simple.4. It reduces the amount of data loss as it emphasizes on electronic data storage.
Figure 7 shows how the face identification associates with face identification, extraction algorithm and storing procedure algorithm.
The data converted into the database are three-dimensional shape data of surfaces of faces and color image data.Different conditions (an angle and lighting directions) of the inquiry image are supplied to the data, and thereby a color image of each person's face from the database in accordance with the shooting conditions is generated.By comparing the color with the inquiry image, the collation is implemented.

Screen Shots
Since the Face ID device is an embedded system, a database for face template and face vector are stored in Firebird database system because of portability and flexibility.The operating platform of the system is Local Area Network (LAN) connected; there is a server and client for the developed system.The following are the modules use in the system: employee maintenance module, basic information module, attendance report module, time scheduling module, time monitoring module, security level maintenance module, and time recorder module

Networking Considerations
Networking is the practice of linking two or more computing devices together for the purpose of sharing data.Networks are built with a mix of computer hardware and computer software.
Since the face identification device is an embedded system, it can also act as server or as client likewise with the personal computer too.The principle of TCP/IP (Transmission Control Protocol / Internet Protocol) , a unique IP address is needed to allow the two devices to communicate with each other via wireless or wired connection.

Hardware Requirements
The developed system has been designed and implemented using the following hardware requirements:

Software Requirements
The proposed system needs the following operating system and application software:

Figure 1 .
Figure 1.Diagram of Agile software systems Figure 2. Theoretical framework

Figure 3 .
Figure 3. Paradigm of the study.

Figure 4 .
Figure 4.The architectural lay-out of the study

Figure 5 .
Figure 5.The block diagram showing constitution of a face image recognition system according to an embodiment of the device Figure 9. Employee maintenance module , in punch card machine, employees can