Sample Full Manuscript-FMC - Cabungcag - Calledo - Fuentes - Teoganco
Sample Full Manuscript-FMC - Cabungcag - Calledo - Fuentes - Teoganco
A Capstone Project
Argao Campus
Argao, Cebu
Cabungcag, Maribel P.
Teoganco, Darren D.
2021
ii
ABSTRACT
Wearing a face mask in public spaces and congested settings is the most
effective prevention method. In 2020, COVID-19 being a pandemic disease had
rapid spread of the virus over the world. The respondents emphasized that they
are in favor of implementing governments action and laws against COVID-19 and
noted to follow. The accuracy rate prediction of face mask checker reached up to
89-90%, using a pre-trained model. The algorithm used by the system was a
deep learning technique which was a convolutional neural network, the Single
Shot Detector (SSD) algorithm. Support Vector Machine, a machine learning
algorithm was not applied in the system because it cannot support tertiary
datasets efficiently for face mask categories namely, with face mask, improper,
and no face mask.
The Face Mask Checker system would be a great help to the Security
Personnel in monitoring students, faculty, and staff who follow health and safety
protocols against COVID-19. The improper face mask detection was not
accurate. It produces a beep alert sound when no face masks were detected,
reminding them to follow minimum health protocol and wear their face masks.
The Capstone Project entitled Face Mask Checker prepared and submitted by Maribel
P. Cabungcag, April Kim S. Calledo, Mary Angel R. Fuentes, and Darren D. Teoganco has
been examined and is recommended for approval and acceptance.
======================================================
Chairman Member
======================================================
Chairperson, IT Department
iv
ACKNOWLEDGEMENT
Making and working on this capstone project and research was not easy. Some
people contributed time and effort to the success of this study, which not only improved
this research but made it possible.
We loved to thank our family and parents for giving us the encouragement,
support, and means to reach our aspirations in life. We’re so grateful to the Python
Expert Instructor of the Information Technology department, Dr. Melanie R. Albarracin
as our Project Adviser, who choose our proposed research title and guided us to
improve this research project and system in every chapter.
We would also love to thank our research respondents, who undoubtedly
bestowed their time on answering our prepared questionnaire for this study. We’re so
thankful to our friends, notably to Mr. Mel Jay Llanos suggested this research project
title development.
We would love to thank the faculty and staff of the Cebu Technological
University-Argao Campus. To the cooperation of our team members, who encoded and
decoded the necessary parts and requirements of this capstone project and research.
We would always be grateful for the help of the panelists, Dr. Christine Joy A. Tomol,
Mr. Morris Dayaganon, and Engr. Ryan H. Teo gave suggestions to improve this
research project.
We would love to extend our warm gratitude to our Subject Adviser, Dr.
Christine Joy A. Tomol of Capstone Project and Research, who gave her all-out support
and guided us to enhance and make this research possible throughout the school year.
And especially to our sincere thanks to Almighty God, who gave us strength,
sincerity, and faith to finish this research until the end.
v
TABLE OF CONTENTS
Page
TITLE PAGE i
ABSTRACT ii
APPROVAL SHEET iii
ACKNOWLEDGEMENT iv
TABLE OF CONTENTS v
LIST OF TABLES viii
LIST OF FIGURES ix
CHAPTER
1 THE PROBLEM AND ITS SCOPE 1
INTRODUCTION 1
Rationale of the Study 1
Theoretical Background 3
Theoretical Framework of the Study 3
Review of Related Literature and Studies 10
Statement of the Problem 21
Scope and Limitations of the Study 22
Significance of the Study 23
RESEARCH METHODOLOGY 24
Design 24
Flow of the Study 25
Locale of the Study 26
Respondents 28
vi
Data Instruments 28
Treatment of Data 29
SYSTEM METHODOLOGY 30
Requirements Specifications 30
Technical Feasiblity
32
Schedule Feasibility 33
Requirements Modelling (IPO) 34
Object Modelling 36
Flowchart of the System 38
Data Design (ERD) 39
System Architecture 40
List of Modules 41
Testing Plan 42
Definition of Terms and Glossary 44
CHAPTER
2 PRESENTATION, ANALYSIS, AND INTERPRETATION OF DATA 47
CHAPTER
3 SUMMARY OF FINDINGS, CONCLUSION, AND
RECOMMENDATIONS 55
Summary of Findings 55
Conclusion 57
Recommendations 57
System Graphical User Interface (GUI) Design 59
BIBLIOGRAPHY 75
APPENDICES 89
Appendix A Transmittal Letter 90
Appendix B Questionnaire 91
vii
Appendix C Project Working Title Form 93
Appendix D Project Adviser Appointment Form 94
Appendix E Grammarian’s Certification 95
Appendix F Curriculum Vitae 96
viii
LIST OF TABLES
Table Table Name Page
CHAPTER I
INTRODUCTION
virus over the world. Wearing a face mask in public spaces and congested
settings is the most effective prevention method. The World Health Organization
wherein the first suspected case in the Philippines was investigated in January
2020. Wearing a face mask is essential in all indoor public spaces and covered
areas. Businesses had a difficult time getting started and staying open due to the
COVID-19 virus. Some irresponsible people refuse to wear masks with so many
close to one another (almost 6 feet), but it can also be disseminated by persons
who do not have symptoms, are unaware that they are infected, and don't have
protective clothing.
According to the report of the World Health Organization, the country has
increased health and safety protocols including the wearing of face masks
because of increased cases. All public, private areas, and hospitals are monitored
2
by security personnel if the people are wearing their face masks when entering
university faculty, staff, and students are wearing face masks and face shields to
enter the campus. Monitoring them manually wearing face masks will not be
easy in all areas of the campus. So, an automation process of detecting those
who are wearing and not wearing face masks is one of the solutions.
developing a face mask detection system that has an alert feature. This aims to
detect or check a person who has a face mask and without a required face mask.
This system, the face mask detector, aims to produce generated reports
accurately based on what is viewed in the camera that is placed in a position that
reaches an area that is passed by many people. The alert feature aims to remind
the security personnel and let people know to wear their face masks preventing
the spread of the virus. This will bridge the gap between the regulation that
keeps people safe from the virus and the people who violate the health and
pandemic. People were initially urged not to wear them to conserve the limited
quantity for healthcare professionals. Now that facial coverings are more
commonly available, there is increasing evidence of their utility. Face masks are
3
(Denton Media, 2020). So, the researchers observed that many people didn't
follow the protocol. This system will help and save more lives of people. It can
minimized.
Theoretical Background
Maryland, and a few other research facilities. The goal of early image processing
was to boost the image's quality. It was created with the intention of improving
people's visual effects. The input of image processing is a low-quality image, and
of signal processing in which the input is an image and the output is an image or
its associated features.
computers to manipulate digital images. For tangible copies such as prints and
general processes that all sorts of data must go through when using digital
techniques.
data that the computer can understand. This happens in a particular piece of
hardware called a frame grabber, which also serves as a storage device for the
image. Image processing results will be transmitted to the outside world via I/O
In the field of AI, image processing technology is widely used for image
datasets. It’s specifically used for object and face detection or recognition. To
(SVM), and so on usually use shallow structures. CNN is good at dealing with
image classification and recognition difficulties and has improved the accuracy of
many machine learning tasks, the convolution neural network (CNN) created in
recent years has been widely used in the field of image processing. It's evolved
into a powerful and widely used deep learning model (Xin & Wang, 2019) for
Vapnik with his colleagues (Vapnik et al., 1997), it’s one of the toughest
describe the learning process statistically, as does the theory of building learning
machines.
Before storing the image, some pre-processing steps are performed, such
the background pattern, is removed from the objects of interest during the
distribution in pictures.
The images of the classes no face mask improper mask, and face mask
are used to train the SVM with the kernel and upper bound margin values. After
photos that do not include faces, and misclassifications are saved to be used as
Support Vector Machines (SVM) are efficient when having a very high
SVM for different types of images. Support Vector Machines are adaptable for
results are right. The selection of the type of kernel that is most productive for
The study will also use deep learning algorithms of Artificial Intelligence in
general. One of the models that will be used is Convolutional Neural Network
(CNN) for the face mask detection module. The goal is to bring images to finer
pieces into a form that is easier to process without losing features (e.g., eyes,
learn directly from the user's data and then apply multiple deep learning
algorithms to it (Ren, et al., 2015). Cascade CNN was developed in 2007 by Li,
Lin, Shen, Brandt, and Hua (2015). Yang, Yan et al. (2015) proposed the concept
recognizing patterns, on account of its less computation cost and also the ability
from the last layer. Mobile Network is proposed for article locators. It's called
"Mobile Network" by He et al., N.D. (He et al.). Mobile Net is a lot lower
In addition, as image processing evolved, the health and medical field are
19 worldwide, affects the normal life people had. It affects the health of a person
and its way of transmission is by the droplets of saliva from the infected person
8
recommends and mandates everyone to wear a face mask when going public
areas to prevent the spread of the virus, to protect oneself, and to stay safe.
(DILG) in coordination with The Inter-Agency Task Force for the Management of
s.2014, under the constitutional policy enshrined in Article II, Section 15 of the
1987 Philippine Constitution, which states that the State shall protect and
promote the people's right to health and instill health awareness among them.
that day, whenever they are allowed to go out of their homes at all times.
stands for ‘Bawal Walang Face Mask, I is for ‘I-sanitize ang mga kamay, iwas-
hawak sa mga bagay’, D for ‘Dumistansya ng isang metro’, and A for ‘Alamin ang
in the country. This is a reminder to all people to follow health protocols and
to the Philippine President, Pres. Duterte (2021), the authorities must take action
9
to strictly implement this regulation and those who violate will be punished
To the authorities who monitor all people who violate and follow the
regulation, that will be cumbersome since they have to be awake 24/7 (Suresh,
et al., 2021). This research aims to develop a system that requires, checks and
detects people who wear face masks in real-time through cameras and sees to it
if they follow the regulation. This study will also look at the effectiveness of
wearing face mask health regulations of the government. The data sets that are
with masks, no masks, and improper masks to be trained will be from real faces
of people, Kaggle, and other web resources. The system works in real-time
detection of people who wear face masks or not. Then, send a notification alert
to the authorized personnel or admin about the person who violates. Then, the
violator’s facial image will be captured. It will be stored and for recordkeeping
purposes.
wearing a facemask in public and crowded areas is cumbersome, this study will
surveillance cameras in public areas and detect whether people are wearing face
studies related to this research which will serve as the foundation of the study.
also abbreviated as IT, in general, refers to the use of computers, software, and
data.
IT and Pandemic
IT aims to solve real-life problems and make it convenient and easier for
safety protocols by washing and spraying alcohol to hands, wearing their face
masks when going outside, and maintaining social distance. How about making
be prone to the virus. The wearing of face masks is mandatory and those who
will violate this health regulation will be punished. This research aims to develop
a system that requires, checks and detects people who wear face masks in real-
time through cameras and sees to it if they follow the regulation. This will bridge
the gap between the regulation that keeps people safe from the virus and the
Intelligence way back before until Alan Turing published "Computing Machinery
a person, it was fair to conclude that the machine was "thinking" (Press, 2016).
So, the beginning of Artificial Intelligence (AI) was like a science fiction story,
away from reality and an impossible before however today, it’s part of reality and
Face Masks detection system is one of the talks amidst this pandemic
because many researchers wanted to help prevent the rise of COVID-19 cases.
According to Deb (2020), one of the pioneering researchers from India of the
Face Mask detection system, her motivation was that the public must ensure
safety and there were no efficient face mask detection applications that
Based on the work of Rosebrook (2020), when his system project, COVID
19: Face Mask detection is deployed correctly, this has the potential to help
ensure everyone’s safety but he will let the medical professionals decide on if
whose role is to build intelligent systems that are capable of learning, reasoning,
adapting, and performing tasks similar to humans. In this research, let’s say a
monitors and sees if the people wear face masks in the surveillance camera
while what if there is a computer system that acts as the guard or personnel
artificially, that is the Face Mask Checker. Since not all the time the guard or
one of the keys of the IT industry to innovate their systems to intelligent ones
and AI are automation and optimization. The following are data security, building
AI for IT operations (AIOps) uses machine learning and big data. Machine
examples and new examples of data to build a model that can predict results.
According to SoloLearn (n.d.), one example is when a credit card company gives
a call to a user when they notice suspicious activity in the user’s account, they
In the case of face mask detection, there are existing data sets that will
be trained by the machine learning model. The data sets are images of people
with face masks, improper face masks, and no face masks. The data sets will be
searched on the web and from Kaggle, the Face Mask Level Dataset (FMLD),
Google LLC affiliate, is an online group of data scientists and machine learning
find and publish data sets, as well as explore and create models (Wikipedia,
2021).
14
sees and let the computer learn in the same way that a human can do. That’s
data for regression analysis and classification. SVM was developed by Vladimir
Vapnik with his colleagues (Vapnik et al., 1997), it’s one of the toughest
to recognize between the face mask, improper face masks, and no face mask
faces. For a lesser amount of data sets, SVM is suitable however if there are
many data sets, it needs other deep learning algorithms or random forests to
function. There was a research that uses a hybrid algorithm in their machine
learning application and that one of which, they use SVM with 3 datasets to
train. This method will efficiently work with face mask recognition or detection
because its accuracy rate reached 99.5 to 100% (Pan, et al., 2020).
15
and it’s the same as neural networks. The idea is it has multiple neuron layers
like the human brain. Each layer is learning a different type of representation
vision, self-driving systems, and many more (Militante and Dionisio, 2020).
The task of CNN is to bring images to finer pieces into a form that is
easier to process without losing its features (e.g., eyes, mask, hair, etc.) which is
crucial to get good prediction results (Saha, 2018). This research will be applied
in this research with data sets to train in the CNN model and get accurate
with masks and no face masks for detection and segmentation, Sandler and
Howard (2018) said. The research was part of the TensorFlow-slim image
the model that has already been trained for a task by adding extra classification
layers (Fine-tune in MobileNetV2 from Kaggle, 2020). Then, training the entire
model with image net weights to make it perform a second similar task (Joshi,
research from the University of Antique by Militante and Dionisio (2020), detects
a person who is wearing a facemask or not and detects if the person in an area
does observe physical distancing. They use a convolutional neural network (CNN)
algorithms model. Focusing on their Face Mask Detection with an alarm system,
facial images of the person detected who does not wear a mask. It reached an
Learning by still Militante and Dionisio (2020) from the University of Antique, this
face mask and no face mask detection. It also signals an alarm then captures
facial images of the person detected who does not wear a mask. The proposed
17
accuracy rate of 96% with a face mask and no face mask detection which would
a person is detected not wearing a face mask, a beep alert sound can be heard
and stops when they wear their face mask on and properly. The proposed model
they use combines hybrid deep learning and classical machine learning, a simple
The Real-time Mask Detection and Face Recognition using eigenfaces and
The face and face mask detection uses the haar cascade classifier model in
machine learning. When the face mask is detected, the 'Using Mask' message will
be shown that indicates the person has to remove her mask to allow face
Fig. 6: Using Eigenfaces and LBPH Real-time Mask Detection and Face
Recognition for Attendance System
The Face Mask Detector by Purohit (2020), has face mask detection and
alert system modules. The proposed model he used is deep Learning models
such as YOLOv2, YOLOv3, and YOLOv4. YOLO means You Only Look Once, is
another real-time object detection algorithm of deep learning. The alert system
has been composed of mask count, no mask count, and status of the area which
were ‘safe’, ‘warning’, and ‘danger’. His test model reached an accuracy rate of
Fig. 7: Face
Mask
Detector
The Face
Mask
Detection using
machine
learning models by Pan, et al. (2020) from Stanford University uses Multinomial
Logistic Regression model and Support Vector Machine (SVM) algorithms such as
linear, RBF, and polynomial kernels. Their system’s data sets are a mask, no
mask, and incorrect. The trained model reached an accuracy rate of 93.61%.
21
Table 1.
Comparative Matrix for Related Projects
Real-time
Facemask Real-Time
mask
and Face-
COVID- detection
Physical mask Face Face Face
System / 19 Face and face
Distancing Recogniti Mask Mask Mask
Features Mask recognitio
Detection on with Detector Detection Checker
Detection n for
with Alarm Alarm
attendanc
Systems System
e system
Displays Date and Time ✔ ✔ ❌ ✔ ❌ ❌ ✔
Face Mask Detection-3 ❌ ❌ ❌ ❌ ❌
categories or classes (With (With and No (With and (With and (With and (With and
✔ ✔
Mask, Improperly Worn Mask Face Mask No Face No Face No Face No Face
and No Mask) only) Mask only) Mask only) Mask only) Mask only)
Live Count of With Mask and
❌ ❌ ❌ ❌ ✔ ❌ ❌
No Mask
No Mask Image
Capture
✔ ✔ ❌ ❌ ❌ ❌ ❌
Alarm/Beep alert ✔ ✔ ✔ ❌ ❌ ❌ ✔
The system, Face Mask Checker will include the following major modules;
Face Mask Detection (data sets: With Mask, Improper Mask and No Mask) with a
display of date and time, live count of the three datasets, an alert system that
displays the area status and risk status then also those who do not wear their
22
mask properly and no mask will be captured, and the system can have generated
study because they confirmed the use of Face Mask Detection systems in this
time of pandemic to help protect people and prevent the spread of the COVID-19
This study aims to design and develop a system that will check and detect
1.3. Recordkeeping?
3. Based on the findings of the study, what system can be designed and
implemented?
Vision to detect those face mask categories implementing machine learning and
friendly, allowing the user admin to see who is wearing a face mask by the video
within 3-5 meters. Then, when people are detected with no face mask, the
system will beep as an alert notification reminding them to wear their face masks
properly. The Admin can take appropriate actions to make them follow the health
The system’s other scope is that it will be connected with computer/s with
for IP cameras or other cameras and the system’s functionalities since it’s a web
application. For the system’s limitations, the proposed system will not use face
recognition to the faces of the person captured by the system then sends a
24
capture the image of the people who don’t follow the proper wearing of face
masks.
The proposed system of this study aims to detect the person wearing a
surveillance cameras and sees to it if they follow the regulation through a real-
time video stream at CTU-Argao Campus. Here are the significant end-users who
CTU-Argao Campus. This system will help students, faculty, and staff is aware
surveillance.
Health Institution. This system will help the health workers, patients, and staff
in surveillance.
General Public. The demand for protection from the virus is exceedingly great.
reminded and able to wear masks. Face mask checker and detection will be
RESEARCH METHODOLOGY
Design
usually makes some comparisons and contrast linkages that can occasionally be
(Alceso, 2011). This is to look for an overview of the study's variables (Bhandari,
2021) by an interview and observation in the project environment. This study will
also follow the software development life cycle, the agile software development
its assigned team or member and goes through the entire production process,
Input. The research strategic flow of the study commenced with the current
face mask checking at the CTU-Argao campus. It will also cover the data, record,
Process. The process stage will begin with observation of the current status of
face mask regulation and gathering through personal interviews of the Security
data. The planning phase will be completed to determine why a face mask
detection and checker should be developed. After planning, analysis was carried
out to determine who uses the system, what it is, what it does, and where and
when it is used. To determine exactly how the system works, a design is created.
Output. The output of the study is a proposed Face Mask Checker system
design.
27
Cebu, which is about 1km from the national highway. It is located directly to the
right of Secretary Cerge Remonde Sports and Cultural Complex. The campus is
bordered on the north by Dr. TS. Kintanar Street, on the south by Bonifacio
Street, on the east by Ed. Kintanar Street, and on the west by Columbus Street.
the Philippines located 68 kilometers from Cebu City. The rectangle that is Argao
Alcantara, Ronda, and Dumanjug; in the north by Sibonga; and in the east by
the Bohol Strait, in that order (TheTravelLad, 2016). Argao is the southern part
of Cebu with a population of more or less than 62,000 people. The municipality
Respondents
Argao campus. There will be 5 students who will be interviewed randomly across
the BSIT department or other departments. The interview will be done via phone
mostly collected notes to aid in the analysis of the obtained data. Respondents
were permitted to voice any thoughts or ideas they wanted throughout the
Data Instruments
The researchers will interview the security personnel and students of the school
The interviewer manages the interaction and asks questions, while the
over the phone. The internet is also becoming more popular as a tool for
Treatment of Data
secondly, check possible changes can be done based on the interview of the
datasets for face mask checking and detection - with face mask, the improper
category that matches the face masks used at school with the use of face
shields.
interpret the close-ended interview questions, this study will also utilize Thematic
respondents that will be generated from the interview. Interview transcripts from
the topic of investigation are examples of qualitative data (Anderson, 2007). The
SYSTEM METHODOLOGY
Requirements Specifications
Non-Functional Requirements
User-Friendliness
The system's user interface will be simple, easy to understand, and will provide a
Interoperability
With the bare minimum of technical requirements, the proposed system will work
smoothly.
Performance
Even with multiple simultaneous log-ins, the suggested system will run smoothly
Robustness
This system’s face mask checker and detection system algorithm will
automatically detect the face mask categories, with mask, improper face mask,
and no face mask. In the admin section, the proposed system will validate all
inputs and data. Request assistance can't move on to the next step unless
Maintainability
The system will be programmed in a way that the following developers can
Reusability
The system will be built to anticipate future changes in time and will be
Security
The system will contain a login/logout functionality for security reasons, allowing
Technical Feasibility
The following software and hardware specifications will be used during the
development process.
Software Specification
Hardware Specification
Front End. Django and OpenCV – Django is a python framework for web
system will use OpenCV (Open Computer Vision) python library for identification
Back End. Python, TensorFlow, and Keras – Python is a high level programming
language ideal for building machine and deep learning applications. Tensorflow
and Keras are python libraries used for machine learning and deep learning
face mask, Improper face mask, and With face mask datasets. The proposed
and Workbench serves as the medium for interacting with the database and will
Schedule Feasibility
The Gantt chart figure above shows the researchers’ timeline and
proposal. Analyzing the stage of the research and development coding of the
project takes the most time because this will be the catalyst to finding the
Input. The research strategic flow of the study commenced with the current
Mask.
Process. The process stage begins with the gathering of training datasets and
samples. The data sets will be pre-trained model or Face-Mask Level datasets
36
available in GitHub and Kaggle (Batagelj, B., Peer, P. et al., 2021). The training
phase which is also the design phase of the dataset models for Face Detection
and Mask Classification will be implemented using Support Vector Machine (SVM)
be done on how to fill in the gap in this research which is to generate reports in
the system. In addition to that is to add the important features on the face mask
detection main module. When the above features will be implemented, checking
the functionality of the system will be done to test the system’s accuracy rate if it
Output. The output of the study is the report generation and its proposed Face-
Object Modelling
Fig. 13: Use Case Diagram of the Super Admin and Admin
The figure above illustrates the allowable actions the Super Admin and
Administrator can do. The Super Admin has to create the account of the Admin
before he/she can access the system in face mask checking and detection live
video stream. Then, give the credentials to the authorized Security Personnel
Admin. The Super Admin can view the designated area in surveillance and can
manage the accounts of the Admins. The Admin has access to all privileges and
38
can perform all the functionalities of admin user level. Additionally, Admin can
view the face mask detection video stream and edit the system settings of the
system. On the other hand, the Super Admin can have full power access to the
entire network and system and control to the Admins of the system.
Fig. 14: Face Mask Detection Live Video Stream operated by the Admin
Admin. He/She can monitor those who wear face masks when in the Home page
of the system where the Face Mask detection live video stream is placed. The
Admin has access to all privileges and can perform admin user level
functionalities.
39
The system flowchart depicts the system's operation. It's used to lay down
the logic of the system before starting the coding to show it's automated
System Architecture
room, where video compression will be applied. The control points are connected
via an IP network (EFSIC Global, 2010). In essence, a hybrid solution gives one
List of Modules
The following are the list of modules in Face Mask Checker and Detection:
SUPER ADMIN
● LOG IN
● LOG OUT
● HOME
Ø Add admin
Ø View admin
Ø Update admin
Ø Delete admin
Ø Edit account
● SYSTEM SETTINGS
ADMIN
● LOG IN
● LOG OUT
44
● HOME
Ø View account
Ø Edit account
Testing Plan
Test Plan. The scope, technique, resources, and timing of proposed testing
operations can all be described in a test plan. The test planning process
produces a high-level test plan document that describes the software objects to
be tested, the degree of tester independence, the test environment, the test
Unit Testing. Unit testing's basic purpose is to separate the smallest bit of
tested software in an application, separate the rest of the code, and see if it
functions exactly as the developer intended. The researcher utilized this method
to test each component of the system to confirm that each unit or module
45
performs as planned before being connected with the others. This testing
researchers used this strategy to ensure that the user could complete the task
using the program. The system went through this procedure to see if there were
any flaws with the client's understanding of how the system worked. The
as a whole.
whether or not the system matched its acceptance criteria, allowing the
to accomplish its functions. For the purpose of determining how simple and user-
friendly the system is and to expose usability flaws, a small group of intended
Admin. A user of the system. The admin of this study is the Security Personnel
build intelligent systems that are capable of learning, reasoning, adapting, and
computers and systems to extract useful information from digital photos, videos,
based on that data (IBM, n.d.). Furthermore, it is a python library for the
illness has infected millions of people and lost millions of helpless lives in more
than 200 countries based to the World Health Organization (WHO) and declared
a global pandemic.
Dataset. The datasets are images of people with face masks, improper face
masks, and no face masks. Possibly, the data sets will be searched on the web
the same as neural networks. The idea is it has multiple neuron layers like the
2021). In this study, it takes input through an image, then entrusts essential
47
various aspects or objects which refer to the features (e.g., eyes, face mask,
hair, etc.) in the image and can differentiate from the other (Saha, 2018).
integrated with HTML, CSS, and Javascript scripting languages with a Model-
Face Mask. The Philippine government mandated the use of a face mask. A
pathogens shed in respiratory droplets and aerosols into and from the wearer's
and let the computer learn in the same way that a human can do. That’s the
this model will be used as a binary classifier to recognize between a face mask,
a backbone model and an SSD head. As a feature extractor, the backbone model
has had the final fully linked classification layer removed (ArcGIS, n.d.).
Super Admin. The superuser of this study is the Security Personnel who
CHAPTER II
49
data gathered on the current status of health and safety regulation specifically
monitor the face mask policy by the Security Personnel and students of CTU-
Argao Campus. The responses of the respondents are translated into English
developmental in nature, this chapter also presents the basis for the final list of
Table 1.1.1.
Face Mask Checking and Conforming to the Regulation
Theme Responses
Prone to the virus infection if not “For me, I agree because that’s for
following health protocols our health, and safety in this COVID-
19 situation. It’s difficult when we’re
at work and gets the virus, we have
homes to go back from work. And
that’s for safety as well for us, so I
agree to that.”
50
Some of them remove their face mask “For us Ma’am, once they enter the
when inside the school premises school, they are required to wear face
masks. There are tendencies that
while they’re inside, they will remove
it but if we see them, we will ask them
why they remove their mask. They
shall follow the policy.”
Table 1.1.1 shows that the Security Personnel gave his comment
regarding the current status of health and safety regulations specifically wearing
face masks in terms of face mask checking and conforming to the regulation or
protocol in CTU-AC. It was found out that when they do not wear face masks
when going outside, they are prone to virus infection if not able to follow health
protocols especially in wearing a face mask and always consider the social
distancing policy. Another is that the face mask policy is monitored and
mandated by the government because wearing a face mask reduces the amount
regulation is that some of them remove their face mask when inside the school
51
premises, they can't deny the fact that they remove their facemask when inside
Since the current practice turned out to be prone to the virus infection if
not following health protocols and some of the people who go inside the school
premises remove their face masks, a system should be in place to address the
image classification in the machine and deep learning algorithms to train models
on datasets to create useful smart systems. It’s specifically used for object and
Table 1.1.2.
Security Personnel-Recordkeeping
Theme Responses
Table 1.1.2 shows that the Security Personnel commented on the current
recordkeeping. It was known that the security personnel did not have time to
watch every person because they had other duties, and it would help them
lessen their work. The security personnel did not keep records of those who
the image processing technology used for object and face detection or
1.2. Students
Table 1.2.1.
Students-Face Mask Checking
Theme Responses
Table 1.2.1 shows that the five respondents commented on the current
status of health and safety regulations on wearing face masks in terms of face
implemented at school. Wherever they are at school, 100% of the students are
always wearing face masks to be fair to others and prevent the spread of
viruses. Since then, wearing a face mask not only protects others from expelled
respiratory droplets but can also protect them from other people’s illnesses.
Wearing a face mask is a must, so people need to use face masks for their
health and safety the protection from COVID-19. So, the researchers found out
that a Surgical mask is the most preferable to use by the students with 100%,
but rarely N95 and washable face masks, both are 20% worn by them. A face
anyone, including those who are unwittingly carrying the virus, from transmitting
it to others.
Table 1.2.2.
Students-Conforming to the Regulation
Theme Responses
Table 1.2.2 shows that the five respondents commented on the current
status of health and safety regulations, specifically wearing face masks in terms
It was found out that all of the students are always wearing their face
masks with 100% preference when they go inside the school and are following
Since wearing a face mask is a must, the students can’t deny the fact that
there are times they will not wear or remove their face mask when inside the
school with 99.9% preference because it causes heat and disruption of their
public areas. All respondents agreed to the memorandum of DILG about the
wearing of face masks with 100% preference because wearing face masks help
prevent the spread of the virus. It is also a way of protecting their body health,
in a way that they can inhale air that has a droplet of a COVID-19 virus, so a
face mask can filter throughout the mouth. This implementation gives the
student’s a big help to protect not just themselves, but also the safety of others.
Wearing a face mask is vital, anyone is obliged and must obey the protocols
Table 2.1.1
Possible Functionalities to Monitor Wearing of Face Mask Policy
Theme Responses
Table 2.1.1 shows that the Security Personnel gave his comment
regarding the possible functionality of the proposed system to help monitor the
face mask policy in CTU-AC. It was found out that to monitor the wearing of face
Since the current practice turned out that they do not keep on watch all
address the problem in the application of image processing technology used for
56
masks.
57
CHAPTER III
User Interface (GUI) of the system showing the screenshots of the design.
Summary of Findings
specifically wearing face masks, the students, faculty, and staff are prone to
virus infection of COVID-19 when they go inside the school premises and remove
protocols during this pandemic. Also, the respondent clarified that he/she cannot
monitor the whole time those who wear face masks or not because he/she and
other Security Personnel like him/her have other duties and they didn’t keep a
record of them. So, a system can be used to address their concern in the
monitoring of wearing face masks. The respondents emphasized that they are in
favor of implementing governments action and law against COVID-19 and noted
to follow.
58
The study utilized the descriptive research design. This is used to describe
the current state of events, people, or topics. This is to look for an overview of
This study also follows the software development life cycle, the agile software
of face mask checking and detection. The accuracy rate prediction of face mask
convolutional neural network, the Single Shot Detector (SSD) algorithm. Support
because it can not support tertiary datasets efficiently for face mask categories
Conclusion
In conclusion, the Face Mask Checker system will be a great help to the
Security Personnel in monitoring students, faculty, and staff who follow health
and safety protocols against COVID-19 mandated by the IATF, DOH, DILG, and
the government. As well, it helps to monitor health workers, patients, and staff
Additionally, this allows Security Personnel to monitor and see through the
live video stream, to those people within the frame of a certain area. It can be
placed in any other areas where people usually pass by. The improper wearing
alert sound when no face masks were detected, reminding them to follow
Recommendations
Checker system;
categories - with face mask, improper, and no face mask for fast face
mask detections and so that the accuracy rate of prediction and detection
increases;
Security Personnel will be sent when area and risk status is ‘danger’ which
5. Super Admin Security Personnel can view all the live video cameras of
purposes;
to improve it;
Landing Page
This page is the main landing page wherein the users can navigate and
Security Personnel.
SUPER ADMIN
Log in Page
The log-in page allows the Super Admin Security Personnel, who was the
superuser of the system allowing them to input their credentials which were their
registered email and password, enabling them to access the system features.
Home Page
the total number of Admin Security Personnel and the importance of wearing a
face mask, as well as the details of the government mandating the use of a face
Memorandum No. 071-2020 in coordination with the Inter-Agency Task Force for
Order No. 168, s.2014 and the Department of Health (DOH) with the campaign
This module consists of pages where the Super Admin can add a new
account of an Admin Security Personnel, view, edit, and delete Admins’ accounts.
Add Admin
The Super Admin can add a new account of an Admin Security Personnel
View Admin
65
This module allows the Super Admin the view the saved information of the
Update Admin
66
This module allows the Super Admin to edit and update the accounts of
Delete Admin
This module allows the Super Admin delete the Admin Security
Personnels’ accounts.
This module allows the Super Admin to change their log-in credentials,
username, and name. The email cannot be altered in the front-end design unless
System Settings
Log out
The Super Admin can log out of the system using this module by
navigating at the upper right corner, then clicking the username with an icon of
ADMIN
Log in Page
This page allows the Admin Security Personnel user to input their
credentials which are their registered email and password given by the Super
Admin to log in and access the system. It also gives users the option of changing
their passwords. If forgotten, the system will send an email to change their
password.
Home Page
This page is displayed after the Admin successfully logs in to the system.
It shows the current date, time, camera ID number, and place assigned in
monitoring face masks of the Security Personnel. When no face masks and
improper face masks are detected, the box colors are red and blue. Then, it will
beep in real-time, reminding the people in the frame to wear their face masks
properly. When the box color is green, indicating proper face masks are
detected.
View Account
Edit Account
The Admin can modify their login credentials, username, and name using
this module.
This module allows the Admin to customize the color layout design of the
system.
Log out
This module allows the Admin to log out into the system found in the
BIBLIOGRAPHY
Journal
Batagelj, B., Peer, P., et al. (2021). How to Correctly Detect Face-Masks for
Hussain, S., Yu, Y., et al. (2021). IoT and Deep Learning Based Approach for
Rapid Screening and Face Mask Detection for Infection Spread Control of
COVID-19. Applied Sciences, 11(8), 1–16.
https://doi.org/10.3390/app11083495
Jignesh Chowdary, G., Punn, N. S., et al. (2021). Face Mask Detection Using
Li, T., & Liu, Y. (2020). Mask or no mask for COVID-19: A public health and
Loey, M., Manogaran, G., et al. (2021). A hybrid deep transfer learning model
with machine learning methods for face mask detection in the era of the
COVID-19 pandemic. Measurement, 167(108288), 1–2.
https://doi.org/10.1016/j.measurement.2020.108288
Matusiak, Ł., et. al, (2020). The use of face masks during the COVID ‐19
pandemic in Poland: A survey study of 2315 young adults. PMC.
Published. https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7361243/
78
Maurya, P., Nayak, S., & Vijayvargiya, S. (2021). COVID-19 Face Mask Detection.
Meivel, S., Indira Devi, K., et al. (2021). Real time analysis of unmask face
detection in human skin using tensor flow package and IoT algorithm.
Materials Today: Proceedings , 1.
https://doi.org/10.1016/j.matpr.2020.12.864.
Recognition with Alarm System using Deep Learning. 2020 11th IEEE
Control and System Graduate Research Colloquium (ICSGRC) , 106–110.
https://doi.org/10.1109/ICSGRC49013.2020.9232610
Nagrath, P., Jain, R., et al. (2021). SSDMNV2: A real time DNN-based
face mask detection system using single shot multibox detector and
MobileNetV2. Sustainable Cities and Society, 66(102692), 1–9.
https://www.sciencedirect.com/science/article/pii/S2210670720309070
Pooja, S., & Preeti, S. (2021). Face Mask Detection Using AI.
SpringerLink,293–305.https://link.springer.com/chapter/10.1007/978-981-
33-4236-1_16
Suhaimin, M. S. M., Hijazi, M. H. A., et al. (2021). Real-time mask detection and
79
face recognition using eigenfaces and local binary pattern histogram for
attendance system. Bulletin of Electrical Engineering and Informatics ,
10(2), 1105–1113. https://doi.org/10.11591/eei.v10i2.2859
Xin, M., & Wang, Y. (2019). Research on image classification model based on
deep convolution neural network. EURASIP Journal on Image and Video
Processing, 40.
https://jivp-eurasipjournals.springeropen.com/articles/10.1186/s13640-
019-0417-8
Websites
Affandi, A. (2021, June 5). How do I set a condition in HTML button tags to stop
my Webcam Video Stream on webpage | Python Django . Stackoverflow.
Retrieved April 16, 2022, from
https://stackoverflow.com/questions/67850593/how-do-i-set-a-condition-
in-html-button-tags-to-stop-my-webcam-video-stream-on-w
AI, T. (2020, October 14). Build Face Mask Detection Model In 5 Minutes .
https://www.slideshare.net/Angilo/descriptive-research
80
Año, E. (2020, April 9). Mandatory Wearing of Face Masks or other Protective
Argao trip planner. (n.d.). Inspirock. Retrieved September 19, 2021, from
https://www.inspirock.com/philippines/argao-trip-planner
https://e-edukasyonph.com/english/opinion-about-wearing-of-face-mask-
6193911
Banerjee, S. (2020, June 13). Face Mask Detection using Google Colab. Analytics
Vidhya. https://medium.com/analytics-vidhya/face-mask-detection-using-
google-colab-160f7b20cdea
https://classeval.wordpress.com/introduction/basic-evaluation-measures/
#:~:text=Accuracy%20is%20calculated%20as%20the,dataset%20(P
%20%2B%20N).
https://www.scribbr.com/methodology/qualitative-research/
Bhupinder. (2018, October 1). 9 reasons to choose Agile Methodology for Mobile
81
Braulio. (2020, July 9). Face mask detection in street camera video streams
Dickson, B. (2020, January 6). What are convolutional neural networks (CNN)?
TechTalks. https://bdtechtalks.com/2020/01/06/convolutional-neural-
networks-cnn-convnets/#:~:text=Convolutional%20neural%20networks
%2C%20also%20called,a%20postdoctoral%20computer%20science
%20researcher.&text=The%20early%20version%20of%20CNNs,)%2C
%20could%20recognize%20handwritten%20digits.
https://sisu.ut.ee/imageprocessing/book/1
Django (web framework). (2022, March 24). Wikipedia. Retrieved March 29,
2022, from https://en.wikipedia.org/wiki/Django_(web_framework)
82
https://www.government.nl/topics/coronavirus-covid-19/face-masks-
mandatory-in-all-indoor-public-spaces
Feng, J. (n.d.). Importance of Face Mask Compliance and Safety for Businesses .
Figueiredo, R. (2016, April 27). What exactly is a “unit” in unit testing? The
Gordon, J. (2021, March 5). Intro to Deep Learning (ML Tech Talks). YouTube.
https://youtu.be/AhE8RhPGH1A
Grossfeld, B. (2020, January 23). Deep learning vs. machine learning: a simple
83
Guest view: A critical roadblock to spreading the virus. (2020, June 16). Denton
Record-Chronicle. https://dentonrc.com/opinion/guest-view-a-critical-
roadblock-to-spreading-the-virus/article_1c937c2e-ff37-5a7d-843c-
5a5ac4186510.html
Gupta, K. (2021, July 16). Display date and time in videos using OpenCV –
Haddad, J. (2020, May 22). How I built a Face Mask Detector for COVID-19
using
https://en.wikipedia.org/wiki/History_of_artificial_intelligence
84
javascript month day year format. (n.d.). Grepper. Retrieved April 15, 2022, from
https://www.codegrepper.com/code-examples/javascript/
javascript+month+day+year+format
Jayadas, A. (2021, July 14). Face Mask Detection. GitHub. Retrieved March 20,
Mittal, L. (2021, September 15). Mask Detector. GitHub. Retrieved January 17,
2022,from
https://github.com/laksh-1/mask-detector/tree/837f0a5b58e8e653068157
2260a25aa7cd46a563
Moroney, L. (2019, August 31). Intro to Machine Learning (ML Zero to Hero -
Mujtaba, H. (2021, January 17). Real-time Face detection | Face Mask Detection
Palmer, J. (2020, August 31). Face Mask Detection at the Edge. IBM Cloud.
https://www.ibm.com/cloud/blog/face-mask-detection-at-the-edge
Pan, C., et al. (2020, November 18). Face Mask Detection Using Machine
https://github.com/dastratakos/Face-Mask-Detection
Preventing the spread of the coronavirus. (2022, January 11). Harvard Health
Prevent Epidemics.
https://preventepidemics.org/wp-content/uploads/2020/08/Annex-
I_Sample-questionnaire-on-mask-usage.pdf
86
https://github.com/adityap27/face-mask-detector
Python Get Today’s Current Date and Time. (n.d.). NixCraft. Retrieved January
Ramachandran, K. (2020, May 28). Face Mask Detector using Deep Learning
Rosebrock, A. (2020, May 4). COVID-19: Face Mask Detector with OpenCV,
Sandler, M., & Howard, A. (2018, April 3). MobileNetV2: The Next Generation of
On-Device Computer Vision Networks. Google AI Blog. Retrieved March
29, 2022, from https://ai.googleblog.com/2018/04/mobilenetv2-next-
generation-of-on.html
S.C. (2020, May 17). Student Management System in Django. GitHub. Retrieved
87
Shetty, A., Lara,et. al. (n.d.). Face Mask Detection. Yashlara. Retrieved
https://www.kaggle.com/sgcuber24/fine-tune-mobilenet-v2
https://en.wikipedia.org/wiki/Support-vector_machine
88
The CCTV transmission networks explained. (2010, November 10). IFSEC Global.
https://www.ifsecglobal.com/cctv-2/the-cctv-transmission-network-the-
glue-that-ties-it-all-together/#:~:text=The%20topologies%20usually
%20employed%20are,see%20Figure%201%20at%20right.
https://thetravelad.wordpress.com/2016/07/24/travel-guide-argao-cebu/
Uri, E. (2020, June 8). Real time face mask detection in Android with TensorFlow
Urooj, W. (2019, November 26). How to fetch and modify Date and Time in
https://en.wikipedia.org/wiki/Vapnik
%E2%80%93Chervonenkis_theory#:~:text=Vapnik
%E2%80%93Chervonenkis%20theory%20(also%20known,a
%20statistical%20point%20of%20view.
89
Watson, R. (2018, October 21). How to enable face detection in images using
What is computer vision? (n.d.). IBM. Retrieved March 29, 2022, from
https://www.ibm.com/ph-en/topics/computer-vision#:~:text=Computer%
20vision%20is%20a%20field,recommendations%20based%20on%20that
%20information.
E-Books
Albiso, A., Malenab, M., & Saldo, J. (2019). Municipal Public Vehicle Information
of Qualitative Data.
https://rosemarieanderson.com/wp-content/uploads/2014/08/ThematicCo
ntentAnalysis.pdf
APPENDICES
91
Truly yours,
MARY ANGEL R. FUENTES
DARREN D. TEOGANCO
MARIBEL P. CABUNGCAG
APRIL KIM S. CALLEDO
Researchers
Noted by:
DR. CHRISTINE JOY A. TOMOL, Ph.D.
Adviser, Capstone Project, and Research I & II
Approved by:
DR. EINGILBERT C. BENOLIRAO, DEV. Ed. D.
Campus Director
Appendix B Questionnaire
Interview Questions
Security Personnel/Guard
1. In this time of pandemic, do you agree on wearing a face mask and face
shield?
2. the students and staff of the school always wear face masks when they
enter the gate?
3. To those who enter the school, do they wear face masks even though
they are no longer at the gate and are already inside the school
premises?
4. Would it be nice to have a system or application that you can use to
monitor the wearing and face mask? Yes, or No?
5. What would you like this system to do to help you watch or monitor
those who are not wearing face masks or wearing a face mask?
6. What do you think if there’s a system like this, would it be useful to all
Security Personnel? Yes, or no?
Students
93
1. When going and entering the school, do you wear a face mask?
1.1. When you're inside of the school?
1.2. Are there times that you remove it while inside the school premises?
1.3. What type of face mask do you wear?
• surgical mask
• respirator/N95/N99
• Dust mask
• Washable cloth masks
• others
DARREN D. TEOGANCO
Lamacan, Sibonga, Cebu
09919622150
[email protected]
March 11, 2000
Education
● Lamacan Elementary School, 2006-2012, Elementary Graduate
● Don Julian Enad Memorial National High School, 2012-2018,
General Academic Strand (GAS), Senior High School Graduate
● Cebu Technological University – Argao Campus, 2018-Present,
Bachelor of Science in Information Technology
Relevant Skills
● Self-Learning Skills
● Knowledge of Microsoft Office Suites
● Interpersonal communication
● Adaptable and eager to try new things, as well as a desire to improve
efficiency on assigned jobs of the company
● Ability to understand and carry out oral and written instructions and
request clarification when needed
● Familiar with computer languages such as C, Python, PHP, MySQL, HTML,
CSS, JavaScript, C#, Visual Basic, Java
● Basic knowledge on Git version control
Education
● Guiwanonon Elementary School, 2006-2012, Elementary Graduate
● Simala National High School, 2012-2018, Accounting Businesses and
Management (ABM), Senior High School Graduate
● Cebu Technological University – Argao Campus, 2018-Present,
Bachelor of Science in Information Technology
Relevant Skills
● Knowledge of Microsoft Office Suites
● Computer Literate
● Good Interpersonal
● Analytical
● Willingness to learn and be trained
● Adaptable and eager to try new things, as well as a desire to improve
efficiency on assigned jobs of the company
● Able to set up a computer system according to instructions
● Setting up hardware and software
● Familiar with computer languages such as C, Python, MySQL, HTML, CSS,
Javascript, C#, Java
MARIBEL P. CABUNGCAG
100
Education
● Tabon Elementary School, 2006-2012, Elementary Graduate
● Mantalongon National High School, 2012-2018,
Technical Vocational (ICT strand), Senior High School Graduate
● Cebu Technological University – Argao Campus, 2018-Present,
Bachelor of Science in Information Technology
Relevant Skills
● Knowledge of Microsoft Office Suites
● Analytical
● Able to set up a computer system according to instructions
● Setting up hardware and software
● Interpersonal communication
● Adaptable and eager to try new things, as well as a desire to improve
efficiency on assigned jobs of the company
09151738232
[email protected]
April 5, 1999
Education
● Talo-ot Central Elementary School, 2006-2012, Elementary Graduate
● Simala National High School, 2012-2018,
General Academic Strand (GAS), Senior High School Graduate
● Cebu Technological University – Argao Campus, 2018-Present,
Bachelor of Science in Information Technology
Relevant Skills
● Arts and Creativity
● Knowledge of Microsoft Office Suites
● Analytical
● Interpersonal communication
● Adaptability
● Computer hardware and software systems installation according to
instructions
● Familiar with computer languages such as C, Python, MySQL, HTML, CSS,
JavaScript, Visual Basic, C#, Java
● Basic knowledge on Git version control