Automated Attendance Monitoring System for Cattle through CCTV.
Abstract
In a period of rapid technological advancement, the traditional methods of taking attendance of cattle after coming from grazing yard is done by normal counting as this have become inefficient and outdated. To overcome this issue, an Automatic Attendance Monitoring System (AAMS) using Closed-Circuit Television (CCTV) technology has been introduced as a solution. These abstracts highlight its key features and benefits. The Automated Attendance Monitoring System through CCTV uses the power of computer vision and machine learning (ML) for attendance monitoring. Using CCTV cameras in big dairy farms cows & buffalos are monitored. This can be also been implemented in grazing yards systems to analyse unique identification of data. That data will be cross-analysed using the database to record the attendance by colour, breed, and most importantly RFID tag. This system analyses accuracy the in-out time of cattle’s using this recognition system. In training data, with multiple images of individual cow or buffalo from all angles & features are captured. Up to 30000-50000 images will be generated with supporting to that closed circuit images of all RFID implanted at ears of cattle. If the image captured by CCTV and the images in the database match, then attendance will be done and the report submitted. To build this system, the Python language was used. For developing systems, software is required, such as PyCharm or Spyder. We also need some libraries, like the OpenCV library and the Cattle Recognition library. The CNN algorithm is used for cattle recognition. Django, HTML, CSS, JavaScript, MySQL, and Bootstrap technologies will be used. In conclusion, the Automatic Attendance Monitoring System through CCTV provides an effective solution for the traditional attendance system. Provides high security and accuracy.
References
C. Muñoz, J. Huircan, F. Huenupan and P. Cachaña, "PTZ camera tuning for real time monitoring of cows in grazing fields," 2020 IEEE 11th Latin American Symposium on Circuits & Systems (LASCAS), San Jose, Costa Rica, 2020, pp. 1-4, doi: 10.1109/LASCAS45839.2020.9068964.
Tun, S.C.; Onizuka, T.; Tin, P.; Aikawa, M.; Kobayashi, I.; Zin, T.T. Revolutionizing Cow Welfare Monitoring: A Novel Top-View Perspective with Depth Camera-Based Lameness Classification. J. Imaging 2024, 10, 67. https://doi.org/10.3390/jimaging10030067.
M. Dangore, A. S. R, A. Ghanashyam Chendke, R. Shirbhate, Y. K. Mali and V. Kisan Borate, "Multi-class Investigation of Acute Lymphoblastic Leukemia using Optimized Deep Convolutional Neural Network on Blood Smear Images," 2024 MIT Art, Design and Technology School of Computing International Conference (MITADTSoCiCon), Pune, India, 2024, pp. 1-6, doi: 10.1109/MITADTSoCiCon60330.2024.10575245.
N. P. Mankar, P. E. Sakunde, S. Zurange, A. Date, V. Borate and Y. K. Mali, "Comparative Evaluation of Machine Learning Models for Malicious URL Detection," 2024 MIT Art, Design and Technology School of Computing International Conference (MITADTSoCiCon), Pune, India, 2024, pp. 1-7, doi: 10.1109/MITADTSoCiCon60330.2024.10575452.
M. D. Karajgar et al., "Comparison of Machine Learning Models for Identifying Malicious URLs," 2024 IEEE International Conference on Information Technology, Electronics and Intelligent Communication Systems (ICITEICS), Bangalore, India, 2024, pp. 1-5, doi: 10.1109/ICITEICS61368.2024.10625423.
J. Pawar, A. A. Bhosle, P. Gupta, H. Mehta Shiyal, V. K. Borate and Y. K. Mali, "Analyzing Acute Lymphoblastic Leukemia Across Multiple Classes Using an Enhanced Deep Convolutional Neural Network on Blood Smear," 2024 IEEE International Conference on Information Technology, Electronics and Intelligent Communication Systems (ICITEICS), Bangalore, India, 2024, pp. 1-6, doi: 10.1109/ICITEICS61368.2024.10624915.
D. R. Naik, V. D. Ghonge, S. M. Thube, A. Khadke, Y. K. Mali and V. K. Borate, "Software-Defined-Storage Performance Testing Using Mininet," 2024 IEEE International Conference on Information Technology, Electronics and Intelligent Communication Systems (ICITEICS), Bangalore, India, 2024, pp. 1-5, doi: 10.1109/ICITEICS61368.2024.10625153.
Mali, Y. K., Rathod, V. U., Borate, V. K., Chaudhari, A., & Waykole, T. (2023, June). Enhanced Pin Entry Mechanism for ATM Machine by Defending Shoulder Surfing Attacks. In International Conference on Recent Developments in Cyber Security (pp. 515-529). Singapore: Springer Nature Singapore.
S. Modi, Y. K. Mali, V. Borate, A. Khadke, S. Mane and G. Patil, "Skin Impedance Technique to Detect Hand-Glove Rupture," 2023 OITS International Conference on Information Technology (OCIT), Raipur, India, 2023, pp. 309-313, doi: 10.1109/OCIT59427.2023.10430992.
Y. Mali, B. Vyas, V. K. Borate, P. Sutar, M. Jagtap and J. Palkar, "Role of Block-Chain in Health-Care Application," 2023 IEEE International Conference on Blockchain and Distributed Systems Security (ICBDS), New Raipur, India, 2023, pp. 1-6, doi: 10.1109/ICBDS58040.2023. 10346537.
Y. Mali, M. E. Pawar, A. More, S. Shinde, V. Borate and R. Shirbhate, "Improved Pin Entry Method to Prevent Shoulder Surfing Attacks," 2023 14th International Conference on Computing Communication and Networking Technologies (ICCCNT), Delhi, India, 2023, pp. 1-6, doi: 10.1109/ICCCNT56998.2023.10306875
A. Chaudhari et al., "Cyber Security Challenges in Social Meta-verse and Mitigation Techniques," 2024 MIT Art, Design and Technology School of Computing International Conference (MITADTSoCiCon), Pune, India, 2024, pp. 1-7, doi: 10.1109/MITADTSoCiCon60330.2024.10575295.
Y. K. Mali and A. Mohanpurkar, "Advanced pin entry method by resisting shoulder surfing attacks," 2015 International Conference on Information Processing (ICIP), Pune, India, 2015, pp. 37-42, doi: 10.1109/INFOP.2015.7489347 ‘.
Y. K. Mali, S. A. Darekar, S. Sopal, M. Kale, V. Kshatriya and A. Palaskar, "Fault Detection of Underwater Cables by Using Robotic Operating System," 2023 IEEE International Carnahan Conference on Security Technology (ICCST), Pune, India, 2023, pp. 1-6, doi: 10.1109/ICCST59048.2023.10474270.
A. Chaudhari, S. Dargad, Y. K. Mali, P. S. Dhend, V. A. Hande and S. S. Bhilare, "A Technique for Maintaining Attribute-based Privacy Implementing Blockchain and Machine Learning," 2023 IEEE International Carnahan Conference on Security Technology (ICCST), Pune, India, 2023, pp. 1-4, doi: 10.1109/ICCST59048.2023.10530511.
Y. K. Mali, S. Dargad, A. Dixit, N. Tiwari, S. Narkhede and A. Chaudhari, "The Utilization of Block-chain Innovation to Confirm KYC Records," 2023 IEEE International Carnahan Conference on Security Technology (ICCST), Pune, India, 2023, pp. 1-5, doi: 10.1109/ICCST59048.2023.10530513.
V. Borate, Y. Mali, V. Suryawanshi, S. Singh, V. Dhoke and A. Kulkarni, "IoT Based Self Alert Generating Coal Miner Safety Helmets," 2023 International Conference on Computational Intelligence, Networks and Security (ICCINS), Mylavaram, India, 2023, pp. 01-04, doi: 10.1109/ICCINS58907.2023.10450044.
Mali, Y., & Chapte, V. (2014). Grid based authentication system, International Journal of Advance Research in Computer Science and Management Studies, Volume 2, Issue 10, October 2014 pg. 93-99, 2(10).
Yogesh Mali, Nilay Sawant, "Smart Helmet for Coal Mining”, International Journal of Advanced Research in Science, Communication and Technology (IJARSCT) Volume 3, Issue 1, February 2023, DOI: 10.48175/IJARSCT-8064
Pranav Lonari, Sudarshan Jagdale, Shraddha Khandre, Piyush Takale, Prof Yogesh Mali, "Crime Awareness and Registration System ", International Journal of Scientific Research in Computer Science, Engineering and Information Technology (IJSRCSEIT), ISSN : 2456-3307, Volume 8, Issue 3, pp.287-298, May-June-2021.
Jyoti Pathak, Neha Sakore, Rakesh Kapare , Amey Kulkarni, Prof. Yogesh Mali, "Mobile Rescue Robot", International Journal of Scientific Research in Computer Science, Engineering and Information Technology (IJSRCSEIT), ISSN : 2456-3307, Volume 4, Issue 8, pp.10-12, September-October-2019.
Devansh Dhote , Piyush Rai , Sunil Deshmukh, Adarsh Jaiswal, Prof. Yogesh Mali, "A Survey : Analysis and Estimation of Share Market Scenario ", International Journal of Scientific Research in Computer Science, Engineering and Information Technology (IJSRCSEIT), ISSN : 2456-3307, Volume 4, Issue 8, pp.77-80, September-October-2019.
Rajat Asreddy, Avinash Shingade, Niraj Vyavhare, Arjun Rokde, Yogesh Mali, "A Survey on Secured Data Transmission Using RSA Algorithm and Steganography", International Journal of Scientific Research in Computer Science, Engineering and Information Technology (IJSRCSEIT), ISSN : 2456-3307, Volume 4, Issue 8, pp.159-162, September-October-2019
Shivani Chougule, Shubham Bhosale, Vrushali Borle, Vaishnavi Chaugule, Prof. Yogesh Mali, “Emotion Recognition Based Personal Entertainment Robot Using ML & IP", International Journal of Scientific Research in Science and Technology(IJSRST), Print ISSN : 2395-6011, Online ISSN : 2395-602X, Volume 5, Issue 8, pp.73-75, November-December-2020.
Amit Lokre, Sangram Thorat, Pranali Patil, Chetan Gadekar, Yogesh Mali, " Fake Image and Document Detection using Machine Learning", International Journal of Scientific Research in Science and Technology(IJSRST), Print ISSN : 2395-6011, Online ISSN : 2395-602X, Volume 5, Issue 8, pp.104-109, November-December-2020.
Ritesh Hajare, Rohit Hodage, Om Wangwad, Yogesh Mali, Faraz Bagwan, "Data Security in Cloud", International Journal of Scientific Research in Computer Science, Engineering and Information Technology (IJSRCSEIT), ISSN : 2456-3307, Volume 8, Issue 3, pp.240-245, May-June-2021
Yogesh Mali and Tejal Upadhyay, “Fraud Detection in Online Content Mining Relies on the Random Forest Algorithm”, SWB, vol. 1, no. 3, pp. 13–20, Jul. 2023, doi: 10.61925/SWB.2023.1302
Dodda, S., Narne, S., Chintala, S., Kanungo, S., Adedoja, T., & Sharma, D. (2024). Exploring AI-driven Innovations in Image Communication Systems for Enhanced Medical Imaging Applications. Journal of Electrical Systems, vol 20(3),pp. 949-959 Mar 24. doi.org/10.52783/jes.1409
S. N. S. D. T. A. Madan Mohan Tito Ayyalasomayajula, Sathishkumar Chintala, “AI-Driven Decision Support Systems in Management: Enhancing Strategic Planning and Execution”, IJRITCC, vol. 12, no. 1, pp. 268–276, Mar. 2024.
Mali, Y. K., Rathod, V., Dargad, S., & Deshmukh, J. Y. (2024). Leveraging Web 3.0 to Develop Play-to-Earn Apps in Healthcare using Blockchain. In Computational Intelligence and Blockchain in Biomedical and Health Informatics (pp. 243-257). CRC Press.
Deshmukh, J. Y., Rathod, V. U., Mali, Y. K., & Sable, R. (2024). and Classification. Data-Centric Artificial Intelligence for Multidisciplinary Applications, 114.
Dodda, S., Narne, S., Chintala, S., Kanungo, S., Adedoja, T., & Sharma, D. (2024). Exploring AI-driven Innovations in Image Communication Systems for Enhanced Medical Imaging Applications. Journal of Electrical Systems, vol 20(3), pp.949-959 Mar 24. doi.org/10.52783/jes.1409.
S. N. S. D. T. A. Madan Mohan Tito Ayyalasomayajula, Sathishkumar Chintala, “AI-Driven Decision Support Systems in Management: Enhancing Strategic Planning and Execution”, IJRITCC, vol. 12, no. 1, pp. 268–276, Mar. 2024.
Purohit, S. Role of Industrialization and Urbanization in Regional Sustainable Development–Reflections from Tier-II Cities in India.
Purohit, M. S. (2012). Resource Management in the Desert Ecosystem of Nagaur District: An Ecological Study of Land (Agriculture), Water and Human Resources (Doctoral dissertation, Maharaja Ganga Singh University).
Zheng, X., Haseeb, M., Tahir, Z., Tariq, A., Purohit, S., Soufan, W., ... & Jilani, S. F. (2024). Coupling Remote Sensing Insights with Vegetation Dynamics and to Analyze NO 2 Concentrations: A Google Earth Engine-driven Investigation. IEEE Journal of Selected Topics in Applied Earth Observations and Remote Sensing.
Purohit, S. (2023). California Geographical Society, 96162, California, United States. Journal of Environmental Science and Public Health, 7, 176-184.
Satapathy, S., & Purohit, S. (2024). POND DEGRADATION AND WILDLIFE PRESERVATION: A GEOGRAPHICAL ANALYSIS. vol, 6(2), 74-85.
Bhardwaj, L. K., Rath, P., Jain, H., Purohit, S., Yadav, P., & Singh, V. (2024). The Impact of Climate-Induced Livelihood, Health, and Migration on Women and Girls: A Review. Global Insights on Women Empowerment and Leadership, 100-118.
Mali, Y. K., Dargad, S., Dixit, A., Tiwari, N., Narkhede, S., & Chaudhari, A. (2023, October). The Utilization of Block-chain Innovation to Confirm KYC Records. In 2023 IEEE International Carnahan Conference on Security Technology (ICCST) (pp. 1-5). IEEE.