SlideShare ist ein Scribd-Unternehmen logo
1 von 17
General Overview
•

Time & Attendance for a large distributed
enterprises is not a simple matter.

•

There are geographical separation of sites,
multiple offices, difference Business Rules and
Policies at different locations, Complex Payroll
Calculations, etc.

•

The more complexity, the more struggle to
standardize and bring control to total
operation and convenience to its employees

•

In absence of proper system & controls, buddy
punching, clock-padding, manipulation in
working hours, etc. take place.
A good Time & Attend System can •

Time and Attendance System discovers truth!

•

System provide the convenience to pay even at hourly
terms

•

Allow clocking-in the employees as well tracking the
employees

•

Reporting on employee attendance and monitoring shifts
and department with accuracy

•

Can stop Buddy punching and timing-manipulations

•

Reduce human errors and access real-time accurate
information

•

Can meet your company’s payroll criteria

•

Detailed reports can be generated in few seconds

•

Employee disputes over pay can be eliminated

•

Provides valuable services to employees and
management & employee/employer interests protected
Face Recognition Technology

Face Recognition
Humans mostly use faces to recognize individuals. Advances
in computing capability now enables similar recognition
automatically. Early face recognition algorithms used simple
geometric models, but the recognition process has now
matured into a science of sophisticated mathematical
representations
and
matching
processes.
Major
developments have propelled face recognition technology into
the spotlight.
Face recognition can be used for both verification (1:1), and
Identification (1:N) applications.

Face Template
The heart of the facial recognition system is the Local Feature
Analysis (LFA) algorithm. This is the mathematical technique
the system uses to encode faces. The system maps the face
and creates a "template", a unique numerical ID for that
face.
Once the system has stored a "template", it can compare it to
the thousands or millions of "templates" stored in a database.
Identification vs. Verification

Face Recognition Technology

Verification (1:1, one-to-one) - The process of determining a
person's identity by performing matches against one biometric
template that is located upon known ID. 1:1 verification usually
uses tokens like: Card, code, or any other key based indexing.
Identification (1:N, one-to-many) - The process of determining a
person's identity by performing matches against multiple biometric
templates. Identification systems are designed to determine identity
based solely on biometric information. There are two types of
identification systems: positive identification and negative
identification.
Our advanced applications allow our customer full control over
recognition method. We support both 1:1 (verification) an 1:N
(identification) methods.

Performance
Recommended minimal image size

640 x 480 pixels

Multiple faces detection time
(using 640 x 480 image)

0.07 sec.

Single face processing time
(after detecting all faces)

0.13 sec.

Matching speed

100,000 faces/sec.

Maximum database size

unlimited
Why Choose Face Recognition over other
Biometrics?
•
•

Face Recognition Technology

It is non-intrusive and requires no physical
interaction on behalf of the user
It is accurate and allows for high enrolment and
verification rates

•

It does not require an expert to interpret the
comparisons

•

It can use your existing hardware infrastructure –
existing cameras and image capture devices will
work smoothly

•

You can use existing images without having to reenrol every user (For ID cards, passports, driver’s
licenses, etc.)

•

It is the ONLY biometric that allows you to perform
passive identification in a one-to-many
environment (e.g. Identifying a terrorist in a busy
airport terminal)
Face Recognition Process Flow
•

FRS OnTime is a Time & Attendance System
based on Face Recognition Technology, specially
designed to provide irrefutable personal
identification / verification

•

It uses pre-configured & optimized hardware &
software to enroll and verify employees, store
their Face records, keep logs, real-time images
and interface with other application & systems

•

FRS OnTime provides enhanced security &
superior speed

•

Employee IN & OUT logs are stored in
professional database and this reduces the
manual drudgery of Data Entry, Register
maintenance and monthly requirement of
Punch Cards for conventional Time Clocks to a
minimum
KEY FEATURES


Visual view of video input

 Visual view of face detection
 History / Enrolled / Suspects view
 Voice alerts during system operation
 Easy to use graphic interface
 Fast and accurate Face verification
 No scope for proxy/buddy punching
 Proper logs of Attendance Data
 Integrate with other HRMS/Payroll/ERPs
APPLICATION FEATURES


Facial Recognition customizable engine

 Generic video interface
 Real time facial detection & matching

 Enhanced matching mechanism
 Adjustable image processing
 User Management / Time Zones
 Time Attendance feature (multiple In / Out)
 Access Control feature

 Log Browser including with real-time image
 User Privacy mode - no image savings (optional)
 Data can be exported to any file formats
 Support MS-SQL, MySQL & Oracle DB
SOFWARE INTERFACE
Facial Recognition - Adjustable Attributes
•
•
•
•
•
•

Matching threshold (determines similarity level of matching)
Ageing templates (to train the system)
Matching attempts duration (if matching requires more time)
IOD (Inter Ocular Distance – distance between the camera and face)
Liveliness check (to check live face)
Real time Image storing (optional)
FRS SYSTEM OPTIONS AVAILABLE
Stand-Alone System

FRS Device +
Magnetic Card Reader

FRS Device +
Code Panel

FRS Device +
RFID Reader

FRS Stand Alone
Device
SEQUENCE DIAGRAM
SERVER-CLIENT ARCHITECTURE
SYSTEM LAYOUT IN MULTI-SITES SCENARIO
System Requirement
1. Hardware
a) FRS Box – which comprises of:
i) Camera
iii) LCD Display
iv) Single Channel DVS
v) Buzzer & LED Indicators
vi) Power adapter & cables
b) Entry Level PC with Window 7 Prof.
2. Software
FRS Application with necessary user licenses
Inttelix® Security Solutions Pvt. Ltd. is an organization focuses on Face Recognition Systems &
Biometric Technologies. Inttelix® specializes in Face Recognition Algorithms, Biometric Hardware,
Software Research & Development, OEM and ODM supplies.
Inttelix® is headquartered in India and has subsidiary company in Brazil. We have marketing and
support offices in Delhi & Mumbai and have presence across India & Middle-East through our Resellers
Network

57A, Race Course Road, Coimbatore - 641 018
Tamil Nadu, India
Phone : +91 422 2220845, 2221539
Presence In : Ahmadabad | Baroda | Chennai | Mumbai | New Delhi
Overseas : Brazil | Hong Kong | U.S.A

Weitere ähnliche Inhalte

Was ist angesagt?

Hotel Management with Hibernate MVC Minor Project
Hotel Management with Hibernate MVC Minor ProjectHotel Management with Hibernate MVC Minor Project
Hotel Management with Hibernate MVC Minor Projectjames parmar
 
Powerpoint Marketing Template
Powerpoint Marketing TemplatePowerpoint Marketing Template
Powerpoint Marketing TemplateMike Lee
 
document for Voice banking system mini project
document for Voice banking system mini projectdocument for Voice banking system mini project
document for Voice banking system mini projectJal Pari
 
Final document project1
Final document project1Final document project1
Final document project1zohaib naveed
 
Hotel Management System SRS
Hotel Management System SRS Hotel Management System SRS
Hotel Management System SRS Paras
 
Hitachi ID Password Manager: Enrollment, password reset and password synchron...
Hitachi ID Password Manager: Enrollment, password reset and password synchron...Hitachi ID Password Manager: Enrollment, password reset and password synchron...
Hitachi ID Password Manager: Enrollment, password reset and password synchron...Hitachi ID Systems, Inc.
 
Pg 2 fa_tech_brief
Pg 2 fa_tech_briefPg 2 fa_tech_brief
Pg 2 fa_tech_briefHai Nguyen
 
From Password Reset to Authentication Management
From Password Reset to Authentication ManagementFrom Password Reset to Authentication Management
From Password Reset to Authentication ManagementHitachi ID Systems, Inc.
 
Software Requirement Analysis and Specification (SRS) of Automated Cyber Cafe...
Software Requirement Analysis and Specification (SRS) of Automated Cyber Cafe...Software Requirement Analysis and Specification (SRS) of Automated Cyber Cafe...
Software Requirement Analysis and Specification (SRS) of Automated Cyber Cafe...Misu Md Rakib Hossain
 
Hitachi ID Identity Manager: Faster onboarding, reliable deactivation and eff...
Hitachi ID Identity Manager: Faster onboarding, reliable deactivation and eff...Hitachi ID Identity Manager: Faster onboarding, reliable deactivation and eff...
Hitachi ID Identity Manager: Faster onboarding, reliable deactivation and eff...Hitachi ID Systems, Inc.
 

Was ist angesagt? (15)

Hotel Management with Hibernate MVC Minor Project
Hotel Management with Hibernate MVC Minor ProjectHotel Management with Hibernate MVC Minor Project
Hotel Management with Hibernate MVC Minor Project
 
Powerpoint Marketing Template
Powerpoint Marketing TemplatePowerpoint Marketing Template
Powerpoint Marketing Template
 
VBOT
VBOTVBOT
VBOT
 
document for Voice banking system mini project
document for Voice banking system mini projectdocument for Voice banking system mini project
document for Voice banking system mini project
 
Final document project1
Final document project1Final document project1
Final document project1
 
Minder Product Demo
Minder Product DemoMinder Product Demo
Minder Product Demo
 
Hotel Management System SRS
Hotel Management System SRS Hotel Management System SRS
Hotel Management System SRS
 
Hitachi ID Password Manager: Enrollment, password reset and password synchron...
Hitachi ID Password Manager: Enrollment, password reset and password synchron...Hitachi ID Password Manager: Enrollment, password reset and password synchron...
Hitachi ID Password Manager: Enrollment, password reset and password synchron...
 
Hitachi ID Identity Manager
Hitachi ID Identity ManagerHitachi ID Identity Manager
Hitachi ID Identity Manager
 
Pg 2 fa_tech_brief
Pg 2 fa_tech_briefPg 2 fa_tech_brief
Pg 2 fa_tech_brief
 
From Password Reset to Authentication Management
From Password Reset to Authentication ManagementFrom Password Reset to Authentication Management
From Password Reset to Authentication Management
 
Defining Enterprise Identity Management
Defining Enterprise Identity ManagementDefining Enterprise Identity Management
Defining Enterprise Identity Management
 
Managing Passwords for Mobile Users
Managing Passwords for Mobile Users Managing Passwords for Mobile Users
Managing Passwords for Mobile Users
 
Software Requirement Analysis and Specification (SRS) of Automated Cyber Cafe...
Software Requirement Analysis and Specification (SRS) of Automated Cyber Cafe...Software Requirement Analysis and Specification (SRS) of Automated Cyber Cafe...
Software Requirement Analysis and Specification (SRS) of Automated Cyber Cafe...
 
Hitachi ID Identity Manager: Faster onboarding, reliable deactivation and eff...
Hitachi ID Identity Manager: Faster onboarding, reliable deactivation and eff...Hitachi ID Identity Manager: Faster onboarding, reliable deactivation and eff...
Hitachi ID Identity Manager: Faster onboarding, reliable deactivation and eff...
 

Ähnlich wie Inttelix OnTime

Inttelix Suspect Detection System
Inttelix Suspect Detection SystemInttelix Suspect Detection System
Inttelix Suspect Detection SystemInttelix
 
Inttelix Stranger Detection System
Inttelix Stranger Detection SystemInttelix Stranger Detection System
Inttelix Stranger Detection SystemInttelix
 
Face Recognition System
Face Recognition SystemFace Recognition System
Face Recognition SystemStudentRocks
 
Face recognigion system ppt
Face recognigion system pptFace recognigion system ppt
Face recognigion system pptRavi Kumar
 
N check attendance-linked-in
N check attendance-linked-inN check attendance-linked-in
N check attendance-linked-inSandeep Mohanta
 
Sara electronics presentation
Sara electronics presentationSara electronics presentation
Sara electronics presentationMaxpromotion
 
Sara electronics presentation 1
Sara electronics presentation 1Sara electronics presentation 1
Sara electronics presentation 1Maxpromotion
 
Touch less-fingerprint-recognition-system (1)
Touch less-fingerprint-recognition-system (1)Touch less-fingerprint-recognition-system (1)
Touch less-fingerprint-recognition-system (1)Palak Pandoh
 
Movie on face recognition in e attendace
Movie on face recognition in e attendaceMovie on face recognition in e attendace
Movie on face recognition in e attendacesbk50000
 
facerecognitiontechnology-131025121934-phpapp01.pdf
facerecognitiontechnology-131025121934-phpapp01.pdffacerecognitiontechnology-131025121934-phpapp01.pdf
facerecognitiontechnology-131025121934-phpapp01.pdfPoooi2
 
AI Approach for Iris Biometric Recognition Using a Median Filter
AI Approach for Iris Biometric Recognition Using a Median FilterAI Approach for Iris Biometric Recognition Using a Median Filter
AI Approach for Iris Biometric Recognition Using a Median FilterNIDHI SHARMA
 
Markus Paasovaara: Face recognition
Markus Paasovaara: Face recognitionMarkus Paasovaara: Face recognition
Markus Paasovaara: Face recognitionFuturice
 
Biometrics and authentication webinar v3
Biometrics and authentication webinar v3Biometrics and authentication webinar v3
Biometrics and authentication webinar v3DigitalPersona
 
Face recognition technology - BEST PPT
Face recognition technology - BEST PPTFace recognition technology - BEST PPT
Face recognition technology - BEST PPTSiddharth Modi
 
SSO IN/With Drupal and Identitiy Management
SSO IN/With Drupal and Identitiy ManagementSSO IN/With Drupal and Identitiy Management
SSO IN/With Drupal and Identitiy ManagementManish Harsh
 
face_detection_att.pptx
face_detection_att.pptxface_detection_att.pptx
face_detection_att.pptxDeeJeeV
 

Ähnlich wie Inttelix OnTime (20)

Inttelix Suspect Detection System
Inttelix Suspect Detection SystemInttelix Suspect Detection System
Inttelix Suspect Detection System
 
Inttelix Stranger Detection System
Inttelix Stranger Detection SystemInttelix Stranger Detection System
Inttelix Stranger Detection System
 
Face recognition
Face recognitionFace recognition
Face recognition
 
Face Recognition System
Face Recognition SystemFace Recognition System
Face Recognition System
 
Face recognigion system ppt
Face recognigion system pptFace recognigion system ppt
Face recognigion system ppt
 
N check attendance-linked-in
N check attendance-linked-inN check attendance-linked-in
N check attendance-linked-in
 
Sara electronics presentation
Sara electronics presentationSara electronics presentation
Sara electronics presentation
 
Sara electronics presentation 1
Sara electronics presentation 1Sara electronics presentation 1
Sara electronics presentation 1
 
Touch less-fingerprint-recognition-system (1)
Touch less-fingerprint-recognition-system (1)Touch less-fingerprint-recognition-system (1)
Touch less-fingerprint-recognition-system (1)
 
face recognition
face recognitionface recognition
face recognition
 
Movie on face recognition in e attendace
Movie on face recognition in e attendaceMovie on face recognition in e attendace
Movie on face recognition in e attendace
 
facerecognitiontechnology-131025121934-phpapp01.pdf
facerecognitiontechnology-131025121934-phpapp01.pdffacerecognitiontechnology-131025121934-phpapp01.pdf
facerecognitiontechnology-131025121934-phpapp01.pdf
 
AI Approach for Iris Biometric Recognition Using a Median Filter
AI Approach for Iris Biometric Recognition Using a Median FilterAI Approach for Iris Biometric Recognition Using a Median Filter
AI Approach for Iris Biometric Recognition Using a Median Filter
 
Markus Paasovaara: Face recognition
Markus Paasovaara: Face recognitionMarkus Paasovaara: Face recognition
Markus Paasovaara: Face recognition
 
Implementation of Biometric Based Electoral Fraud Desisting System
Implementation of Biometric Based Electoral Fraud Desisting SystemImplementation of Biometric Based Electoral Fraud Desisting System
Implementation of Biometric Based Electoral Fraud Desisting System
 
Biometrics and authentication webinar v3
Biometrics and authentication webinar v3Biometrics and authentication webinar v3
Biometrics and authentication webinar v3
 
Face recognition technology - BEST PPT
Face recognition technology - BEST PPTFace recognition technology - BEST PPT
Face recognition technology - BEST PPT
 
SSO IN/With Drupal and Identitiy Management
SSO IN/With Drupal and Identitiy ManagementSSO IN/With Drupal and Identitiy Management
SSO IN/With Drupal and Identitiy Management
 
Biometric solutions-from-kaba
Biometric solutions-from-kabaBiometric solutions-from-kaba
Biometric solutions-from-kaba
 
face_detection_att.pptx
face_detection_att.pptxface_detection_att.pptx
face_detection_att.pptx
 

Kürzlich hochgeladen

Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdfChristopherTHyatt
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 

Kürzlich hochgeladen (20)

Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 

Inttelix OnTime

  • 1.
  • 2. General Overview • Time & Attendance for a large distributed enterprises is not a simple matter. • There are geographical separation of sites, multiple offices, difference Business Rules and Policies at different locations, Complex Payroll Calculations, etc. • The more complexity, the more struggle to standardize and bring control to total operation and convenience to its employees • In absence of proper system & controls, buddy punching, clock-padding, manipulation in working hours, etc. take place.
  • 3. A good Time & Attend System can • Time and Attendance System discovers truth! • System provide the convenience to pay even at hourly terms • Allow clocking-in the employees as well tracking the employees • Reporting on employee attendance and monitoring shifts and department with accuracy • Can stop Buddy punching and timing-manipulations • Reduce human errors and access real-time accurate information • Can meet your company’s payroll criteria • Detailed reports can be generated in few seconds • Employee disputes over pay can be eliminated • Provides valuable services to employees and management & employee/employer interests protected
  • 4. Face Recognition Technology Face Recognition Humans mostly use faces to recognize individuals. Advances in computing capability now enables similar recognition automatically. Early face recognition algorithms used simple geometric models, but the recognition process has now matured into a science of sophisticated mathematical representations and matching processes. Major developments have propelled face recognition technology into the spotlight. Face recognition can be used for both verification (1:1), and Identification (1:N) applications. Face Template The heart of the facial recognition system is the Local Feature Analysis (LFA) algorithm. This is the mathematical technique the system uses to encode faces. The system maps the face and creates a "template", a unique numerical ID for that face. Once the system has stored a "template", it can compare it to the thousands or millions of "templates" stored in a database.
  • 5. Identification vs. Verification Face Recognition Technology Verification (1:1, one-to-one) - The process of determining a person's identity by performing matches against one biometric template that is located upon known ID. 1:1 verification usually uses tokens like: Card, code, or any other key based indexing. Identification (1:N, one-to-many) - The process of determining a person's identity by performing matches against multiple biometric templates. Identification systems are designed to determine identity based solely on biometric information. There are two types of identification systems: positive identification and negative identification. Our advanced applications allow our customer full control over recognition method. We support both 1:1 (verification) an 1:N (identification) methods. Performance Recommended minimal image size 640 x 480 pixels Multiple faces detection time (using 640 x 480 image) 0.07 sec. Single face processing time (after detecting all faces) 0.13 sec. Matching speed 100,000 faces/sec. Maximum database size unlimited
  • 6. Why Choose Face Recognition over other Biometrics? • • Face Recognition Technology It is non-intrusive and requires no physical interaction on behalf of the user It is accurate and allows for high enrolment and verification rates • It does not require an expert to interpret the comparisons • It can use your existing hardware infrastructure – existing cameras and image capture devices will work smoothly • You can use existing images without having to reenrol every user (For ID cards, passports, driver’s licenses, etc.) • It is the ONLY biometric that allows you to perform passive identification in a one-to-many environment (e.g. Identifying a terrorist in a busy airport terminal)
  • 8. • FRS OnTime is a Time & Attendance System based on Face Recognition Technology, specially designed to provide irrefutable personal identification / verification • It uses pre-configured & optimized hardware & software to enroll and verify employees, store their Face records, keep logs, real-time images and interface with other application & systems • FRS OnTime provides enhanced security & superior speed • Employee IN & OUT logs are stored in professional database and this reduces the manual drudgery of Data Entry, Register maintenance and monthly requirement of Punch Cards for conventional Time Clocks to a minimum
  • 9. KEY FEATURES  Visual view of video input  Visual view of face detection  History / Enrolled / Suspects view  Voice alerts during system operation  Easy to use graphic interface  Fast and accurate Face verification  No scope for proxy/buddy punching  Proper logs of Attendance Data  Integrate with other HRMS/Payroll/ERPs
  • 10. APPLICATION FEATURES  Facial Recognition customizable engine  Generic video interface  Real time facial detection & matching  Enhanced matching mechanism  Adjustable image processing  User Management / Time Zones  Time Attendance feature (multiple In / Out)  Access Control feature  Log Browser including with real-time image  User Privacy mode - no image savings (optional)  Data can be exported to any file formats  Support MS-SQL, MySQL & Oracle DB
  • 11. SOFWARE INTERFACE Facial Recognition - Adjustable Attributes • • • • • • Matching threshold (determines similarity level of matching) Ageing templates (to train the system) Matching attempts duration (if matching requires more time) IOD (Inter Ocular Distance – distance between the camera and face) Liveliness check (to check live face) Real time Image storing (optional)
  • 12. FRS SYSTEM OPTIONS AVAILABLE Stand-Alone System FRS Device + Magnetic Card Reader FRS Device + Code Panel FRS Device + RFID Reader FRS Stand Alone Device
  • 15. SYSTEM LAYOUT IN MULTI-SITES SCENARIO
  • 16. System Requirement 1. Hardware a) FRS Box – which comprises of: i) Camera iii) LCD Display iv) Single Channel DVS v) Buzzer & LED Indicators vi) Power adapter & cables b) Entry Level PC with Window 7 Prof. 2. Software FRS Application with necessary user licenses
  • 17. Inttelix® Security Solutions Pvt. Ltd. is an organization focuses on Face Recognition Systems & Biometric Technologies. Inttelix® specializes in Face Recognition Algorithms, Biometric Hardware, Software Research & Development, OEM and ODM supplies. Inttelix® is headquartered in India and has subsidiary company in Brazil. We have marketing and support offices in Delhi & Mumbai and have presence across India & Middle-East through our Resellers Network 57A, Race Course Road, Coimbatore - 641 018 Tamil Nadu, India Phone : +91 422 2220845, 2221539 Presence In : Ahmadabad | Baroda | Chennai | Mumbai | New Delhi Overseas : Brazil | Hong Kong | U.S.A