Back
Home / Blogs / Corporate management / Facial recognition in facial recognition time attendance system

Facial recognition in facial recognition time attendance system

11/06/2025
28/12/2023
Facial recognition in facial recognition time attendance system

Facial recognition technology has been developed and deployed in many businesses. Currently, products using facial recognition technology have been widely applied and achieved great success. In this article, we will learn about facial recognition technology and its applications in today’s world. 

1. What is facial recognition?

Facial recognition is identifying or determining who appears in a photo. The input for this process is an image containing only the face of the person to be identified. The output is the identification (name, ID) of that person.

2. Approach

For every facial recognition system, the most basic method usually used is to extract the most important features of a face. These features are represented as vectors. These vectors are used to match with a database of previously extracted facial features, searching for the vector with the highest cosine similarity, thereby providing identification for the users.

Overview of Facial Recognition Method

Overview of Facial Recognition Method

3. Application of facial recognition technology

3.1 Applications in Human Resource Management

With the rapid development of the economy and technology, the need to use artificial intelligence in human resource management activities of business is growing. 

Every business owns at least a one-time attendance machine to assist in managing the entry and exit times of laborers. Replacing fingerprint/card time attendance machines with facial recognition machines is becoming a trend, especially during the COVID-19 pandemic. 

In addition, facial recognition time attendance machines are solutions to overcome weaknesses such as cheating in card attendance machines and slow speed in fingerprint attendance machines.

3.2 Facial Verification in eKYC Applications in Banks

The KYC (know your customer) process includes ID card verification, facial verification, verification of utility bill documents as proof of address or personal income, and biometric verification.

eKYC (electronic know your customer) is an electronic customer identification method based on the KYC process with the support of advanced technology, such as instant personal information checking against a centralized user identity database, biometric verification, and customer identification using artificial intelligence.

With eKYC technology, specifically Face Matching, our algorithm extracts the most important facial features, digitizes them, and compares them with other facial data collected in the facial recognition database.

4. Methods to accelerate the facial recognition system

Currently, Face Detection, Face Recognition, and Face Anti-Spoofing models are integrated into the time attendance system that Rabiloo deploys on devices with average to good hardware configurations. For the entire device to operate optimally, detection and recognition models must meet speed requirements. Besides, they must meet accuracy requirements for practical deployment.

4.1 Implementation using C++

Compared to Python, C++ is a lower-level language, closer to hardware, so execution will be faster, and the program produced will be more time-efficient.

In the research and experimentation process, we chose to use Python because Python supports this process very well. However, when it came to implementation, we chose C++ to better suit devices with lower configurations, significantly improving program speed.

4.2 Building an appropriate system sleep mode

The time attendance machine doesn't need to operate continuously even outside working hours, at night, or on holidays. 

Continuous heavy tasks, such as face detection, and a 24/7 bright screen, will cause the hardware to heat up, leading to decreased system performance and, especially, a reduced device lifespan. 

Therefore, when building the system, we establish a sleep mode for the device.

4.3 Building a system with multiple parallel execution threads:

The system will be built based on multiple parallel execution threads, and these threads will communicate with each other through queues.

5. Conclusion

We have successfully built and integrated facial detection and recognition technology into the time attendance device. The device operates smoothly, achieving good performance in many cases. In addition, the system has integrated many new features and technologies to assist users, such as using landmarks, or the application of anti-spoofing technologies, which will be presented in future articles.

In the future, we will continue to improve the recognition system, research 3D facial recognition models, and integrate light sensors, motion sensors, and more to make the device even more advanced.

If you are looking for a technology partner with strengths in artificial intelligence, consider Rabiloo. Contact us to find the best technological solution for your business.

SCHEDULE A FREE CONSULTATION


Share


Vy Nguyen
I am a contributing writer skilled in simplifying complex business services into clear, accessible content. My interests also extend to exploring and writing about diverse topics in software development, such as artificial intelligence, outsourcing, and innovative retail solutions.
Find blog
Not just a tool! AI is redefining E-commerce predictions
Not just a tool! AI is redefining E-commerce predictions
Vy Nguyen
06/06/2025
18/06/2025
AI in E-commerce: The 5 potential dangers and ways to prevent them
AI in E-commerce: The 5 potential dangers and ways to prevent them
Vy Nguyen
31/05/2025
18/06/2025

We’re here to help you

Please fill in the blank
Please fill in the blank
Please fill in the blank
Please fill in the blank
Find blog
Tags
Not just a tool! AI is redefining E-commerce predictions
Not just a tool! AI is redefining E-commerce predictions
Vy Nguyen
06/06/2025
18/06/2025
AI in E-commerce: The 5 potential dangers and ways to prevent them
AI in E-commerce: The 5 potential dangers and ways to prevent them
Vy Nguyen
31/05/2025
18/06/2025

Let’s talk

Please fill in the blank
Please fill in the blank
Please fill in the blank
Please fill in the blank