<?xml version="1.0" encoding="UTF-8" standalone="no"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD Journal Archiving and Interchange DTD v2.3 20070202//EN" "archivearticle.dtd">
<article xml:lang="EN" xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" article-type="methods-article">
<front>
<journal-meta>
<journal-id journal-id-type="publisher-id">Bohr. Iam.</journal-id>
<journal-title>BOHR International Journal of Internet of things, Artificial Intelligence and Machine Learning</journal-title>
<abbrev-journal-title abbrev-type="pubmed">Bohr. Iam.</abbrev-journal-title>
<issn pub-type="epub">2583-5521</issn>
<publisher>
<publisher-name>BOHR</publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id pub-id-type="doi">10.54646/bijiam.2022.05</article-id>
<article-categories>
<subj-group subj-group-type="heading">
<subject>Methods</subject>
</subj-group>
</article-categories>
<title-group>
<article-title>Automation attendance systems approaches: a practical review</article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name><surname>Moshayedi</surname> <given-names>Ata Jahangir</given-names></name>
<xref ref-type="aff" rid="aff1"><sup>1</sup></xref>
</contrib>
<contrib contrib-type="author">
<name><surname>Roy</surname> <given-names>Atanu Shuvam</given-names></name>
<xref ref-type="aff" rid="aff1"><sup>1</sup></xref>
</contrib>
<contrib contrib-type="author">
<name><surname>liao</surname> <given-names>Liefa</given-names></name>
<xref ref-type="aff" rid="aff1"><sup>1</sup></xref>
</contrib>
<contrib contrib-type="author">
<name><surname>Lan</surname> <given-names>Hong</given-names></name>
<xref ref-type="aff" rid="aff1"><sup>1</sup></xref>
</contrib>
<contrib contrib-type="author" corresp="yes">
<name><surname>Gheisari</surname> <given-names>Mehdi</given-names></name>
<xref ref-type="aff" rid="aff2"><sup>2</sup></xref>
<xref ref-type="aff" rid="aff3"><sup>3</sup></xref>
<xref ref-type="corresp" rid="c001"><sup>&#x002A;</sup></xref>
</contrib>
<contrib contrib-type="author">
<name><surname>Abbasi</surname> <given-names>Aaqif Afzaal</given-names></name>
<xref ref-type="aff" rid="aff4"><sup>4</sup></xref>
</contrib>
<contrib contrib-type="author">
<name><surname>Bamakan</surname> <given-names>Seyed Mojtaba Hosseini</given-names></name>
<xref ref-type="aff" rid="aff5"><sup>5</sup></xref>
</contrib>
</contrib-group>
<aff id="aff1"><sup>1</sup><institution>School of Information Engineering, Jiangxi University of Science and Technology</institution>, <addr-line>Ganzhou, Jiangxi</addr-line>, <country>China</country></aff>
<aff id="aff2"><sup>2</sup><institution>Department of Computer Science and Technology, Harbin Institute of Technology</institution>, <addr-line>Shenzhen</addr-line>, <country>China</country></aff>
<aff id="aff3"><sup>3</sup><institution>Department of Computer Science and Technology, Islamic Azad University</institution>, <addr-line>Tehran</addr-line>, <country>Iran</country></aff>
<aff id="aff4"><sup>4</sup><institution>Department of Software Engineering, Foundation University Islamabad</institution>, <addr-line>Islamabad</addr-line>, <country>Pakistan</country></aff>
<aff id="aff5"><sup>5</sup><institution>Department of Industrial Management, Yazd University</institution>, <addr-line>Yazd</addr-line>, <country>Iran</country></aff>
<author-notes>
<corresp id="c001">&#x002A;Correspondence: Mehdi Gheisari, <email>mehdi.gheisari61@gmail.com</email></corresp>
</author-notes>
<pub-date pub-type="epub">
<day>19</day>
<month>05</month>
<year>2022</year>
</pub-date>
<volume>1</volume>
<issue>1</issue>
<fpage>25</fpage>
<lpage>34</lpage>
<history>
<date date-type="received">
<day>26</day>
<month>04</month>
<year>2022</year>
</date>
<date date-type="accepted">
<day>19</day>
<month>04</month>
<year>2022</year>
</date>
</history>
<permissions>
<copyright-statement>Copyright &#x00A9; 2022 Moshayedi, Roy, Liao, Lan, Gheisari, Abbasi and Bamakan.</copyright-statement>
<copyright-year>2022</copyright-year>
<copyright-holder>Moshayedi, Roy, Liao, Lan, Gheisari, Abbasi and Bamakan</copyright-holder>
<license xlink:href="https://creativecommons.org/licenses/by-nc-nd/4.0/"><p>This is an open-access article distributed under the terms of the Creative Commons Attribution License (CC BY). The use, distribution or reproduction in other forums is permitted, provided the original author(s) and the copyright owner(s) are credited and that the original publication in this journal is cited, in accordance with accepted academic practice. No use, distribution or reproduction is permitted which does not comply with these terms.</p></license>
</permissions>
<abstract>
<p>Accounting for people is the first step for every manpower-based organization in today&#x2019;s world. Hence, it takes a significant amount of energy and value in the form of money from respective organizations for both implementing a suitable system for manpower management as well as maintaining that same system. Although this amount of expenditure for big organizations is near to nothing and rather just a formality, it does not hold as much truth for small organizations, such as schools, colleges, and even universities, to a certain degree. This is the first point. The second point for discussion is that much work has been done to solve this issue. Various technologies, like biometrics, RFID, Bluetooth, GPS, and QR Code, have been used to tackle the issues of attendance collection. This study paves the path for researchers by reviewing practical methods and technologies used for existing attendance systems.</p>
</abstract>
<kwd-group>
<kwd>biometric</kwd>
<kwd>attendance systems</kwd>
<kwd>QR code</kwd>
<kwd>RFID</kwd>
<kwd>face recognition</kwd>
<kwd>software system</kwd>
</kwd-group>
<counts>
<fig-count count="14"/>
<table-count count="1"/>
<equation-count count="0"/>
<ref-count count="53"/>
<page-count count="10"/>
<word-count count="5431"/>
</counts>
</article-meta>
</front>
<body>
<sec id="S1" sec-type="intro">
<title>Introduction</title>
<p>Student collection and management is one of the most time-consuming tasks in any school, university, and education system. In fact, gathering attendance is a time-consuming job that takes lecture time and the teacher&#x2019;s energy. But if the teacher does not do so, the school and family will not know if the students are pursuing the light of education. This issue has been tried to be solved using various approaches and technologies currently available. The previous record on the research paper and product shows the biometrics, including palm, iris, facial recognition, RFID, NFC, Bluetooth, barcode, and QR, which are more demanding to make the system as automated as possible. In the next section, various types of these technologies are described. This paper divides them into five subsections&#x2014;biometric attendance system, facial recognition-based attendance system, RFID-based attendance system, QR code-based attendance system, and finally embedded system-based attendance system. Following this review of existing attendance systems, the paper concludes with a summary of the types and a short excerpt about the importance of attendance management systems and integrating existing technologies to solve modern problems.</p>
</sec>
<sec id="S2">
<title>Attendance systems variety</title>
<sec id="S2.SS1">
<title>Biometric attendance system</title>
<p>The word biometric comes from the word &#x201C;biometry,&#x201D; which means the process by which a person&#x2019;s unique biological or physical traits are accounted for identification. The most common biometrics used today are palmprint, fingerprint, face, and iris. The biometric attendance system uses one or more of these traits in conjunction to confirm the identity of the personnel attending lectures. A few existing research works are reviewed to highlight existing work in the sector. In their review paper, Tsai-Cheng Li et al. (<xref ref-type="bibr" rid="B1">1</xref>) studied biometrics technology applied in the attendance management system. Their aim was based on some pertinent literature reviews, through which they concluded that attendance management is an important measure and means for discipline as it dictates the productivity of an organization and its sustainability. Biometric data is a measurable biological trait that is unique to every person on the planet and can be automatically verified to confirm a person&#x2019;s identity. Most of the studies have shown that either hand geometry or fingerprint recognition is a very suitable method for the attendance management system. Even on the topic of improving efficiency and service quality, most of the respondents gave a reply of &#x201C;agree&#x201D; or &#x201C;no comment&#x201D;. According to the paper, the biometric recognition system has the least controversies as it is exceedingly difficult to crack, and employees and respondents feel safe and fair that it should be used to manage public attendance. In their paper, O. Shoewu et al. (<xref ref-type="bibr" rid="B2">2</xref>) talked about developing a biometric-based attendance management system and compared it with a traditional manual attendance system (<xref ref-type="fig" rid="F1">Figure 1</xref>).</p>
<fig id="F1" position="float">
<label>FIGURE 1</label>
<caption><p>System Design of O. Shoewu et al. (<xref ref-type="bibr" rid="B2">2</xref>).</p></caption>
<graphic mimetype="image" mime-subtype="tiff" xlink:href="bijiam-2022-05-g001.tif"/>
</fig>
<p>According to <xref ref-type="fig" rid="F1">Figure 1</xref>, their system uses two steps to both enroll and authenticate the users. First, all biometric data is scanned securely through biometric devices; then, their software executes a program for feature extraction from the scanned data and stores it with the biometric owner ID. Although the authentication only performs the same steps once, it matches the data stored in the SQL database. The system also produces an attendance summary report and flags mismatch attempts. The researchers concluded that the system was particularly useful because of its short implementation time and high success rate. On the contrary, one of the most secure forms of biometric recognition is iris recognition. In fact, it is more secure than traditional fingerprint recognition or palm recognition. In their paper, Seifedine Kadry et al. (<xref ref-type="bibr" rid="B3">3</xref>) described a wireless attendance management system based on this very technology (<xref ref-type="fig" rid="F2">Figure 2</xref>).</p>
<fig id="F2" position="float">
<label>FIGURE 2</label>
<caption><p><bold>(A)</bold> Iris Scan Procedure of the System (<xref ref-type="bibr" rid="B3">3</xref>). <bold>(B)</bold> System Design of Kadry et al. (<xref ref-type="bibr" rid="B3">3</xref>).</p></caption>
<graphic mimetype="image" mime-subtype="tiff" xlink:href="bijiam-2022-05-g002.tif"/>
</fig>
<p><xref ref-type="fig" rid="F2">Figure 2A</xref> shows the iris scan procedure of the system. <xref ref-type="fig" rid="F2">Figure 2B</xref> shows how the iris recognition module connects to the workstation and completes the system. The system follows three basic modules: image acquisition and pre-processing texture extraction and signature encoding, and iris signature matching for authentication. The researchers devised a less expensive method of accomplishing the task by incorporating offline iris recognition and connecting it to a management computer <italic>via</italic> a PTR2000 + wireless communication module (<xref ref-type="bibr" rid="B4">4</xref>&#x2013;<xref ref-type="bibr" rid="B12">12</xref>). Their test resulted in a 98.3% success rate. Hence, they concluded that implementing such a technique with iris recognition can ease access to the attendance management systems.</p>
</sec>
<sec id="S2.SS2">
<title>Facial recognition-based attendance system</title>
<p>Facial recognition is a part of biometrics but again, not quite so. Because facial recognition can be fooled, whereas biometrics defines uniqueness, identifying traits must be unique. Facial recognition is common in every face because no face is the same in most cases, and it is easy to implement because any camera with appropriate software can do the task. In their research, Naveed Khan Balcoh et al. (<xref ref-type="bibr" rid="B13">13</xref>) introduced face detection as an accurate and efficient replacement for the old-school manual attendance system (<xref ref-type="fig" rid="F3">Figure 3</xref>). Their system from <xref ref-type="fig" rid="F3">Figure 3</xref> used the EigenFace method to verify faces one by one and match them with their face database, then commit the attendance task. Their face database was populated with face data through a series of image processing techniques, including image histogram normalization, noise gratification, skin classification, and finally, face detection by selecting the region of interest.</p>
<fig id="F3" position="float">
<label>FIGURE 3</label>
<caption><p>System Design of Balcoh et al. (<xref ref-type="bibr" rid="B13">13</xref>).</p></caption>
<graphic mimetype="image" mime-subtype="tiff" xlink:href="bijiam-2022-05-g003.tif"/>
</fig>
<p>The same process goes for attendance by face recognition. In their research, Preeti Mahita et al. (<xref ref-type="bibr" rid="B14">14</xref>) showed a facial recognition-based attendance management system on the raspberry pi 2 using the included raspberry pi camera (<xref ref-type="fig" rid="F4">Figure 4</xref>).</p>
<fig id="F4" position="float">
<label>FIGURE 4</label>
<caption><p>System Design of Mehta et al. (<xref ref-type="bibr" rid="B14">14</xref>).</p></caption>
<graphic mimetype="image" mime-subtype="tiff" xlink:href="bijiam-2022-05-g004.tif"/>
</fig>
<p>They used the Voila Jones algorithm and a local binary pattern in conjunction to identify the faces of the people in a photo. The faces will be stored in the database again with the personal identification, which will then be used to identify the personnel present. They conclude that their system has a 92% accuracy. This accuracy is unacceptable when it comes to class attendance, as classes are very much vital. Priya Pasurmati et al. (<xref ref-type="bibr" rid="B15">15</xref>) showed a much more advanced version of the facial recognition-based attendance management system. Their research uses an open-source facial recognition framework called OpenCV and Python as their main work environment (<xref ref-type="fig" rid="F5">Figure 5</xref>).</p>
<fig id="F5" position="float">
<label>FIGURE 5</label>
<caption><p>System Design of Pasurmarti et al. (<xref ref-type="bibr" rid="B15">15</xref>).</p></caption>
<graphic mimetype="image" mime-subtype="tiff" xlink:href="bijiam-2022-05-g005.tif"/>
</fig>
<p>In <xref ref-type="fig" rid="F5">Figure 5</xref>, their system design shows the components used. They used a physical Webcam to accomplish the task. But the paper concludes with no real-world application proof of the system but only the results of an efficient facial recognition system using Python.</p>
</sec>
<sec id="S2.SS3">
<title>RFID/NFC attendance system</title>
<p>RFID is an abbreviation for &#x201C;radio-frequency identification,&#x201D; which basically means that the communication is done through radio frequencies. In this system, information is digitally stored inside a tag or card, which can be read through radio frequencies. Near-field communication (NFC) is an RFID-based technology that can act as a tag and reader. This technology is cheap to manufacture now and can therefore be readily used in the work sector. Here, a handful of research works on RFID-based attendance systems have been surveyed, some of which work in conjunction with other technologies like Bluetooth. In their paper, Vishal Bhalla et al. (<xref ref-type="bibr" rid="B16">16</xref>) described a system based on Bluetooth technology and RFID reader application. Their proposed system is very novel because they have used RFID matrix cards to gather students&#x2019; attendance and then used Bluetooth for the teacher or professor to confirm the attendance before the data gets permanently sent to the main database (<xref ref-type="fig" rid="F6">Figure 6</xref>).</p>
<fig id="F6" position="float">
<label>FIGURE 6</label>
<caption><p>System Design of Bhallah et al. (<xref ref-type="bibr" rid="B16">16</xref>).</p></caption>
<graphic mimetype="image" mime-subtype="tiff" xlink:href="bijiam-2022-05-g006.tif"/>
</fig>
<p>As explained in the system design in <xref ref-type="fig" rid="F6">Figure 6</xref>, once the data is sent to the central database, it can be edited later, and reports can be generated <italic>via</italic> emails. By adopting this double-layer model, the error rate in their system is extremely low, and almost only human error remains. Their system significantly reduces time consumption in the whole system too. In their paper, the researchers also mention that this project model can be further secured by introducing a fingerprint when authenticating the use of a terminal. They have used Bluetooth rather than Wi-Fi and other long-range solutions because of its range, power consumption, and ease of availability, as they are using the Bluetooth devices embedded in the cell phones of the teachers taking the attendance, where the teachers will use their very cell phones to confirm the RFID attendances. Arulogun O. T. et al. (<xref ref-type="bibr" rid="B17">17</xref>), in their paper, presented an intelligent RFID-based students attendance control and management system. Their simple system is illustrated in <xref ref-type="fig" rid="F7">Figure 7</xref>.</p>
<fig id="F7" position="float">
<label>FIGURE 7</label>
<caption><p>System Design of Arulogun et al. (<xref ref-type="bibr" rid="B17">17</xref>).</p></caption>
<graphic mimetype="image" mime-subtype="tiff" xlink:href="bijiam-2022-05-g007.tif"/>
</fig>
<p>In their project, they used passive tags due to the cost and implementation flexibility. Upon bringing those tags close to the designated reader, the reader captures the card&#x2019;s data and sends it to the system, recording the time of arrival and departure. Their software for handling the data is made with Visual C# with Visual Basic GUI incorporated with Microsoft&#x2019;s SQL server to store the data. The researchers conclude that incorporating a facial recognition application would further enhance security.</p>
<p>Nikhil P. Shegokar et al. (<xref ref-type="bibr" rid="B18">18</xref>), in their study, compared existing technologies in the scope of an automated attendance system based on the raspberry pi and found NFC to be the better path. They compared the various biometric technologies, namely, facial recognition, iris recognition, and NFC. Their paper does not quite show any active system to be implemented, though.</p>
</sec>
<sec id="S2.SS4">
<title>QR code attendance system</title>
<p>The word QR stands for quick response in the term QR code. It belongs to the two-dimensional code family, whose predecessors are actually barcodes. But barcodes have many limitations, hence QR codes have superseded them. One of the main reasons why QR codes are better is that they can store a huge amount of information in any orientation with much more damage tolerance than all other 2D code technology available. At the same time, it is industrially cheap to implement. To make the reasons for why QR code is much more efficient a bit clearer, a small survey on the existing applications of the QR code technology proves useful.</p>
<p>Tin Jin Soon (<xref ref-type="bibr" rid="B19">19</xref>) surveyed and explained the fundamentals of QR code in his journal and also showed various widespread implementation of the QR code technology. He reviewed the technologies used in the fields of industry and transport, from the identification of different products to banknotes. Online and local ordering systems, food freshness control systems, bet ticket management systems, patient management systems, livestock tracking systems, jewelry certification systems, agriculture, telecommunications, payments, and other fields&#x2014;all use QR codes widely. The merits of using QR codes in all these sectors are the same, i.e., efficiency and profitability. Masahiro Hara (<xref ref-type="bibr" rid="B20">20</xref>) showed a similar picture to that of Tin Jin Soon with a more historic approach. He stated that before QR code was there, barcode was widely used. But it came with some limitations, like reading directions and information capacity. So QR code, or quick response code, was developed, which removed these limitations and even allowed alphanumeric characters in different languages to be encoded and represented through it. Compared to the previous generations of 2D codes like barcodes, QR codes have error correction capability up to 30%, whereas the other technology has zero. A QR code, which is five times a barcode, can be read in around 30 ms with a bare minimum RISC processor (MIPS: 18) in any orientation. Because of its versatility, high-speed reading, and miniaturization capability, it is widely used in industrial sectors. Two-layered QR codes are used in order to expand security and prevent the copying of confidential QR codes. For the above reasons and the added facility of cheap implementation, QR code technology was chosen for this project.</p>
<p>Here some existing works related to QR code-based attendance system are surveyed below.</p>
<p>Hsin-Chih Lai et al. (<xref ref-type="bibr" rid="B21">21</xref>) in their research showed a broad implementation of the QR code technology. They showed the implementation of mobile learning in outdoor education through the implication of QR codes. In their study, they developed an outdoor education information system that combines natural and cultural environment GMs or Green Maps using QR codes. The implementation had QR codes printed on a GM, and then students on site for exploration of the outdoor environment were asked to scan the QR codes to find relevant information from the internet. The idea being that having static QR codes on GMs can easily be scanned by a cell phone to retrieve information about the place and the place&#x2019;s elements. A rough sketch about their implementation of QR codes on Green Maps is shown in <xref ref-type="fig" rid="F8">Figure 8</xref>.</p>
<fig id="F8" position="float">
<label>FIGURE 8</label>
<caption><p>Implementation of QR Codes on GMs (<xref ref-type="bibr" rid="B21">21</xref>).</p></caption>
<graphic mimetype="image" mime-subtype="tiff" xlink:href="bijiam-2022-05-g008.tif"/>
</fig>
<p>MRM Hendry et al. (<xref ref-type="bibr" rid="B22">22</xref>) in their paper proposed a smart attendance system by applying QR codes. Their system was built with PhP, MySQL, and Apache based on WAMP Server. The application would prompt registration for the first time and then be logged in to take attendance by generating QR codes. The codes can be scanned with a mobile device, and hence attendance can be taken, and then reports are generated <italic>via</italic> checklists and can be printed. Their system provides very minimal functionality yet gives one of the first ideas about implementing QR codes in an attendance management system, which is shown in <xref ref-type="fig" rid="F9">Figure 9</xref>.</p>
<fig id="F9" position="float">
<label>FIGURE 9</label>
<caption><p>System Design of Hendry et al. (<xref ref-type="bibr" rid="B22">22</xref>).</p></caption>
<graphic mimetype="image" mime-subtype="tiff" xlink:href="bijiam-2022-05-g009.tif"/>
</fig>
<p>An enhanced version of MRM Hendry et al.&#x2019;s (<xref ref-type="bibr" rid="B22">22</xref>) research is the research by the next group of researchers. Xiong Wei et al. (<xref ref-type="bibr" rid="B23">23</xref>) in their research paper made a system for smart attendance system with QR codes with functionalities such as student details, subject details, and report export as csv. They have used SQLite Database as their primary data storage technology. Their whole system is based on Android applications. Both the teacher and student interact with the system through an app. This system is very suitable for small classrooms but not good for big ones because of this very reason. The researchers conclude that integration with facial recognition would prove the system more secure. Their system&#x2019;s idea of sequence is shown in <xref ref-type="fig" rid="F10">Figure 10</xref>.</p>
<fig id="F10" position="float">
<label>FIGURE 10</label>
<caption><p>System Sequence of Wei et al. (<xref ref-type="bibr" rid="B23">23</xref>).</p></caption>
<graphic mimetype="image" mime-subtype="tiff" xlink:href="bijiam-2022-05-g010.tif"/>
</fig>
<p>Ahmad Fahmi Mohd Fauzi et al. (<xref ref-type="bibr" rid="B24">24</xref>) showcased a quite different kind of system that functions both as a web-based smart door lock system as well as an attendance management system, although the main focus is on the smart door itself. In fact, their system is one of the few projects out there that uses both a facial recognition system and a QR code system in conjunction. Their proposed system has the raspberry pi working with a camera that scans the static QR code on the student&#x2019;s or staff&#x2019;s ID card and matches it with the QR code stored on the database. The researchers conclude that the efficiency of this method needs to be further evaluated in the future as this is a preliminary work. Their research&#x2019;s system design is portrayed in <xref ref-type="fig" rid="F11">Figure 11</xref>.</p>
<fig id="F11" position="float">
<label>FIGURE 11</label>
<caption><p>System Design of Fauzi et al. (<xref ref-type="bibr" rid="B24">24</xref>).</p></caption>
<graphic mimetype="image" mime-subtype="tiff" xlink:href="bijiam-2022-05-g011.tif"/>
</fig>
<p>Their proposed system, according to <xref ref-type="fig" rid="F11">Figure 11</xref>, has the raspberry pi working with a camera that scans the static QR code on the student&#x2019;s or staff&#x2019;s ID card and matches it with the QR code stored on the database. The researchers conclude that the efficiency of this method needs to be further evaluated in the future as this is a preliminary work.</p>
</sec>
<sec id="S2.SS5">
<title>Embedded systems-based attendance systems</title>
<p>A combination of hardware and software designed and deployed for a specific function is called an embed system. Such a system is also able to run inside larger systems. Usually, this system has a finite set of functions. In terms of attendance management systems or attendance methods using technology, embedded systems along with various sensors are used. A design and framework for taking attendance in schools and colleges using the AVR ATMEGA16 of ATMEL, a low-power CMOS 8-bit microcontroller, as the handheld client and the Raspberry Pi as the server were presented by Shailendra et al. (<xref ref-type="bibr" rid="B25">25</xref>). The system architecture uses the raspberry pi as the main server, while the ATMEGA-powered handheld device with Xbee is in every class like a zonal model (<xref ref-type="bibr" rid="B26">26</xref>) (<xref ref-type="fig" rid="F12">Figure 12</xref>).</p>
<fig id="F12" position="float">
<label>FIGURE 12</label>
<caption><p>System Architecture of Shailendra et al. (<xref ref-type="bibr" rid="B25">25</xref>).</p></caption>
<graphic mimetype="image" mime-subtype="tiff" xlink:href="bijiam-2022-05-g012.tif"/>
</fig>
<p>The system design in <xref ref-type="fig" rid="F12">Figure 12</xref> shows an example of a single board computer-based attendance system where the raspberry pi is connected by the ATMEGA-powered handheld device &#x2013; both are the backbones of the two-part system. In their paper, Swarnendu Ghosh et al. (<xref ref-type="bibr" rid="B27">27</xref>) used biometric sensor with Arduino uno. This is an example of technologies being used in conjunction. The Arduino attendance module consisted of the Arduino UNO, fingerprint sensor, Bluetooth sensor, and an LCD was named the SAS module or Smart Attendance System Module. An Android application was also made and could connect to the module using Bluetooth for management. This kind of combination and application through the connection of an Arduino with an application using Bluetooth or another medium is novel and very practical. Other applications, such as virtual reality and exergames (<xref ref-type="bibr" rid="B28">28</xref>), use this kind of communication. Arduino and RFID are also used in combination in many projects such as Arbain et al.&#x2019;s (<xref ref-type="bibr" rid="B29">29</xref>) LAS, which is a web-based laboratory attendance system. They used RFID tags inside ID cards as a medium of attendance for staffs controlled by Arduino, which can connect to the system using a USB connection. Asabere et al. (<xref ref-type="bibr" rid="B30">30</xref>) in their paper constructed an attendance system with a fingerprint module and an Arduino Wemos D1 ESP8266 (<xref ref-type="fig" rid="F14">Figure 14</xref>).</p>
<fig id="F13" position="float">
<label>FIGURE 13</label>
<caption><p>Overall Design of Asabere et al. (<xref ref-type="bibr" rid="B30">30</xref>).</p></caption>
<graphic mimetype="image" mime-subtype="tiff" xlink:href="bijiam-2022-05-g013.tif"/>
</fig>
<fig id="F14" position="float">
<label>FIGURE 14</label>
<caption><p>Various Technologies Used for Attendance Management System.</p></caption>
<graphic mimetype="image" mime-subtype="tiff" xlink:href="bijiam-2022-05-g014.tif"/>
</fig>
<p>From their overall system design in <xref ref-type="fig" rid="F14">Figure 14</xref>, three technologies, namely, biometric, microcontroller, and Wi-Fi. are used in conjunction. The figure also shows an example of a microcontroller-based attendance system where the Arduino board is the main backbone of the system. <xref ref-type="table" rid="T1">Table 1</xref> compares the different types of attendance systems based on the advantages and disadvantages of the technologies used in them.</p>
<table-wrap position="float" id="T1">
<label>TABLE 1</label>
<caption><p>Advantages and Disadvantages of Existing Attendance Management System Technologies.</p></caption>
<table cellspacing="5" cellpadding="5" frame="hsides" rules="groups">
<thead>
<tr>
<td valign="top" align="left">No.</td>
<td valign="top" align="left">Method</td>
<td valign="top" align="left">Hardware</td>
<td valign="top" align="left">Software</td>
<td valign="top" align="left">Advantage</td>
<td valign="top" align="left">Disadvantage</td>
</tr>
</thead>
<tbody>
<tr>
<td valign="top" align="left">1</td>
<td valign="top" align="left">Biometric attendance</td>
<td valign="top" align="left">Fingerprint reader, Retina scan machine</td>
<td valign="top" align="left">Custom software, Server software, DBMS</td>
<td valign="top" align="left">Automatic</td>
<td valign="top" align="left">Cost of machine and maintenance</td>
</tr>
<tr>
<td valign="top" align="left">2</td>
<td valign="top" align="left">RFID</td>
<td valign="top" align="left">RFID reader, RFID tags</td>
<td valign="top" align="left">Custom software, DBMS</td>
<td valign="top" align="left">Automatic</td>
<td valign="top" align="left"/></tr>
<tr>
<td valign="top" align="left">4</td>
<td valign="top" align="left">Facial recognition</td>
<td valign="top" align="left">Infrared camera, Server</td>
<td valign="top" align="left">Facial recognition software, Server software, DBMS</td>
<td valign="top" align="left">Automatic</td>
<td valign="top" align="left"/></tr>
<tr>
<td valign="top" align="left">4</td>
<td valign="top" align="left">QR code</td>
<td valign="top" align="left">Camera, QR or Barcode scanner, Server</td>
<td valign="top" align="left">DBMS, Server software</td>
<td valign="top" align="left">Sub- automatic, cheap</td>
<td valign="top" align="left"/></tr>
<tr>
<td valign="top" align="left">5</td>
<td valign="top" align="left">Embedded systems</td>
<td valign="top" align="left">Microcontroller (Arduino/ATMEGA), Single Board Computer (SBC) e.g., Raspberry Pi + Other detection technology</td>
<td valign="top" align="left">Server software, DBMS</td>
<td valign="top" align="left">Automatic, easily deployable</td>
<td valign="top" align="left">Needs expert to operate</td>
</tr>
</tbody>
</table></table-wrap>
<p>According to <xref ref-type="table" rid="T1">Table 1</xref>, biometric attendance, RFID, facial recognition, QR code all require devices and maintenance. All the available technologies require server software and a DBMS as a common requirement to operate. Embedded systems and QR code-based attendance systems are the cheapest and easiest to deploy due to their size. QR code systems are the ones that are sub-automatic as they require clients to scan the QR code themselves.</p>
</sec>
</sec>
<sec id="S3" sec-type="conclusion">
<title>Conclusion</title>
<p>Finally, based on the survey and discussion above, the attendance management system uses four different techniques, at least one subclass of this technique, such as fingerprint reading under biometrics or NFC under RFID. These are shown in detail in the illustration (<xref ref-type="bibr" rid="B22">22</xref>).</p>
<p>As shown in <xref ref-type="fig" rid="F14">Figure 14</xref>, attendance management systems can be classified into four basic types based on the technologies used. The first type, biometrics, can be divided into two types: fingerprint and iris. The second type, RFID, can be divided into two types as well: NFC and RFID Tag. The third type, facial recognition, can utilize two methods. They are normal camera, which are used typically to take photos, and the second is IR-based camera. Examples for IR-based cameras are night-vision cameras and CCTV cameras. These are more accurate than normal cameras. The last and final category is QR. Usually QR is application-based. On that basis of methodology, it can be divided into two more categories: Web-based and App-based. Each of these technologies can be used in combination with others to make the system more secure. The last type, embedded systems, can be an example of this statement. The main division of this type is microcontroller-based and single-board computer (SBC)-based. In conclusion, there are different ways a problem can be solved. For attendance management system, the most feasible design seems to be when cloud technologies (<xref ref-type="bibr" rid="B31">31</xref>&#x2013;<xref ref-type="bibr" rid="B39">39</xref>) and service robots, deep learning, etc., (<xref ref-type="bibr" rid="B40">40</xref>&#x2013;<xref ref-type="bibr" rid="B53">53</xref>) are used in conjunction. Attendance management systems are not just required for schools, colleges, or educational institutions. They are widely used in any place where labor is the main workforce. Software companies, movie studios, and industries require a lot of manpower to function. There may be classified work going on even now. Keeping track of them is vital for the development of the said organization. In this paper, we list the various prominent types of technologies to do exactly that as the world grows and more and more people go toward work better solutions are needed by integrating the most prominent technologies.</p>
</sec>
<sec id="S4" sec-type="author-contributions">
<title>Author contributions</title>
<p>AM, LL, AR, and MG: conceptualization. MG and AA: methodology. AM, AR, LL, HL, MG, AA, and SB: investigation. HL, MG, and AA: resources. AM, AR, and HL: writing&#x2014;original draft preparation. AM, AR, and MG: writing&#x2014;review and editing. All authors have read and agreed to the published version of the manuscript.</p>
</sec>
</body>
<back>
<sec id="S5" sec-type="funding-information">
<title>Funding</title>
<p>This work was supported by Islamic Azad University and Amirkabir University of Science and Technology, Iran.</p>
</sec>
<ack><p>Special thanks to Zhou PinMei and Parivash Nazemiyeh for their great supports.</p>
</ack>
<ref-list>
<title>References</title>
<ref id="B1"><label>1.</label><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Li</surname> <given-names>T</given-names></name> <name><surname>H-W</surname> <given-names>W</given-names></name> <name><surname>T-S</surname> <given-names>W</given-names></name></person-group>. <article-title>The study of biometrics technology applied in attendance management system.</article-title> <source><italic>Proceedings of the 2012 third international conference on digital manufacturing &#x0026; automation.</italic></source> <publisher-loc>Piscataway, NJ</publisher-loc>: <publisher-name>IEEE</publisher-name> (<year>2012</year>).</citation></ref>
<ref id="B2"><label>2.</label><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Shoewu</surname> <given-names>O</given-names></name> <name><surname>Idowu</surname> <given-names>OA</given-names></name></person-group>. <article-title>Development of attendance management system using biometrics.</article-title> <source><italic>Pac J Sci Technol.</italic></source> (<year>2012</year>) <volume>13</volume>:<fpage>300</fpage>&#x2013;<lpage>7</lpage>.</citation></ref>
<ref id="B3"><label>3.</label><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Kadry</surname> <given-names>S</given-names></name> <name><surname>Mohamad</surname> <given-names>S</given-names></name></person-group>. <article-title>Wireless attendance management system based on iris recognition.</article-title> <source><italic>Sci Res Essays.</italic></source> (<year>2013</year>) <volume>2010</volume>:<fpage>1428</fpage>&#x2013;<lpage>35</lpage>.</citation></ref>
<ref id="B4"><label>4.</label><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Balcoh</surname> <given-names>N</given-names></name> <name><surname>Yousaf</surname> <given-names>H</given-names></name> <name><surname>Ahmad</surname> <given-names>W</given-names></name> <name><surname>Iram Baig</surname> <given-names>M</given-names></name></person-group>. <article-title>Algorithm for efficient attendance management: Face recognition based approach.</article-title> <source><italic>Int J Comput Sci Issues.</italic></source> (<year>2012</year>) <volume>9</volume>:<issue>146</issue>.</citation></ref>
<ref id="B5"><label>5.</label><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Mehta</surname> <given-names>P</given-names></name> <name><surname>Pankaj</surname> <given-names>T</given-names></name></person-group>. <article-title>An efficient attendance management sytem based on face recognition using Matlab and Raspberry Pi 2.</article-title> <source><italic>Int J Eng Technol Sci Res.</italic></source> (<year>2016</year>) <volume>5</volume>:<fpage>71</fpage>&#x2013;<lpage>8</lpage>.</citation></ref>
<ref id="B6"><label>6.</label><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Pasumarti</surname> <given-names>P</given-names></name> <name><surname>Purna Sekhar</surname> <given-names>P</given-names></name></person-group>. <article-title>Classroom attendance using face detection and Raspberry-Pi.</article-title> <source><italic>Int Res J Eng Technol.</italic></source> (<year>2018</year>) <volume>03</volume>:<fpage>167</fpage>&#x2013;<lpage>71</lpage>.</citation></ref>
<ref id="B7"><label>7.</label><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Bhalla</surname> <given-names>V</given-names></name> <name><surname>Singla</surname> <given-names>T</given-names></name> <name><surname>Gahlot</surname> <given-names>A</given-names></name> <name><surname>Gupta</surname> <given-names>V</given-names></name></person-group>. <article-title>Bluetooth based attendance management system.</article-title> <source><italic>Int J Innov Eng Technol</italic></source> (<year>2013</year>) <volume>3</volume>:<fpage>227</fpage>&#x2013;<lpage>33</lpage>.</citation></ref>
<ref id="B8"><label>8.</label><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Arulogun</surname> <given-names>OT</given-names></name> <name><surname>Olatunbosun</surname> <given-names>A</given-names></name> <name><surname>Fakolujo</surname> <given-names>OA</given-names></name> <name><surname>Olaniyi</surname> <given-names>OM</given-names></name></person-group>. <article-title>RFID-based students attendance management system.</article-title> <source><italic>Int J Sci Eng Res.</italic></source> (<year>2013</year>) <volume>4</volume>:<issue>2</issue>.</citation></ref>
<ref id="B9"><label>9.</label><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Shegokar</surname> <given-names>N</given-names></name> <name><surname>Kaustubh</surname> <given-names>S</given-names></name> <name><surname>Amitkumar</surname> <given-names>M</given-names></name></person-group>. <article-title>Review automated students attendance management system using Raspberry-Pi and NFC.</article-title> <source><italic>Technology.</italic></source> (<year>2015</year>) <volume>1</volume>:<issue>1</issue>.</citation></ref>
<ref id="B10"><label>10.</label><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Soon</surname> <given-names>T</given-names></name></person-group>. <article-title>QR code.</article-title> <source><italic>Synth J.</italic></source> (<year>2008</year>) <volume>2008</volume>:<fpage>59</fpage>&#x2013;<lpage>78</lpage>.</citation></ref>
<ref id="B11"><label>11.</label><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Hara</surname> <given-names>M</given-names></name></person-group>. <article-title>Development and popularization of QR code.</article-title> <source><italic>Synthesiology.</italic></source> (<year>2019</year>) <volume>1</volume>:<fpage>19</fpage>&#x2013;<lpage>28</lpage>.</citation></ref>
<ref id="B12"><label>12.</label><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Lai</surname> <given-names>H</given-names></name> <name><surname>Chang</surname> <given-names>CY</given-names></name> <name><surname>Li</surname> <given-names>WS</given-names></name> <name><surname>Fan</surname> <given-names>YL</given-names></name> <name><surname>Wu</surname> <given-names>YT</given-names></name></person-group>. <article-title>The implementation of mobile learning in outdoor education: Application of QR codes.</article-title> <source><italic>Br J Educ Technol.</italic></source> (<year>2013</year>) <volume>44</volume>:<fpage>E57</fpage>&#x2013;<lpage>62</lpage>.</citation></ref>
<ref id="B13"><label>13.</label><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Hendry</surname> <given-names>M</given-names></name> <name><surname>Rahman</surname> <given-names>M</given-names></name> <name><surname>Seyal</surname> <given-names>A</given-names></name></person-group>. <article-title>Smart attendance system applying QR code.</article-title> <source><italic>Proceedings of the 12th international conference on latest trends in engineering and technology (ICLTET&#x2019;2017).</italic></source> <publisher-loc>Malaysia</publisher-loc>: <publisher-name>ICLTET</publisher-name> (<year>2017</year>).</citation></ref>
<ref id="B14"><label>14.</label><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Wei</surname> <given-names>X</given-names></name> <name><surname>Manori</surname> <given-names>A</given-names></name> <name><surname>Devnath</surname> <given-names>N</given-names></name> <name><surname>Pasi</surname> <given-names>N</given-names></name> <name><surname>Kumar</surname> <given-names>V</given-names></name></person-group>. <article-title>QR code based smart attendance system.</article-title> <source><italic>Int J Smart Bus Technol.</italic></source> (<year>2017</year>) <volume>5</volume>:<fpage>1</fpage>&#x2013;<lpage>10</lpage>.</citation></ref>
<ref id="B15"><label>15.</label><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Fauzi</surname> <given-names>A</given-names></name> <name><surname>Mohamed</surname> <given-names>N</given-names></name> <name><surname>Hashim</surname> <given-names>H</given-names></name> <name><surname>Saleh</surname> <given-names>M</given-names></name></person-group>. <article-title>Development of web-based smart security door using qr code system.</article-title> <source><italic>Proceedings of the 2020 IEEE International Conference on Automatic Control and Intelligent Systems (I2CACIS).</italic></source> <publisher-loc>Piscataway, NJ</publisher-loc>: <publisher-name>IEEE</publisher-name> (<year>2020</year>). p. <fpage>13</fpage>&#x2013;<lpage>7</lpage>.</citation></ref>
<ref id="B16"><label>16.</label><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Shailendra</surname> <given-names>M</given-names></name> <name><surname>Singh</surname> <given-names>M</given-names></name> <name><surname>Khan</surname> <given-names>A</given-names></name> <name><surname>Singh</surname> <given-names>V</given-names></name> <name><surname>Patil</surname> <given-names>A</given-names></name> <name><surname>Wadar</surname> <given-names>S</given-names></name></person-group>. <article-title>Attendance management system.</article-title> <source><italic>Proceedings of the 2015 2nd international conference on electronics and communication systems (ICECS).</italic></source> <publisher-loc>Piscataway, NJ</publisher-loc>: <publisher-name>IEEE</publisher-name> (<year>2015</year>). p. <fpage>418</fpage>&#x2013;<lpage>22</lpage>. <pub-id pub-id-type="doi">10.1109/ECS.2015.7124938</pub-id></citation></ref>
<ref id="B17"><label>17.</label><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Moshayedi</surname> <given-names>A</given-names></name> <name><surname>Roy</surname> <given-names>A</given-names></name> <name><surname>Liao</surname> <given-names>L</given-names></name> <name><surname>Li</surname> <given-names>S</given-names></name></person-group>. <article-title>Raspberry Pi SCADA zonal based system for agricultural plant monitoring.</article-title> <source><italic>Proceedings of the 2019 6th international conference on information science and control engineering (ICISCE).</italic></source> <publisher-loc>Piscataway, NJ</publisher-loc>: <publisher-name>IEEE</publisher-name> (<year>2019</year>). p. <fpage>427</fpage>&#x2013;<lpage>33</lpage>.</citation></ref>
<ref id="B18"><label>18.</label><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Ghosh</surname> <given-names>S</given-names></name> <name><surname>Mohammed</surname> <given-names>SK</given-names></name> <name><surname>Mogal</surname> <given-names>N</given-names></name> <name><surname>Nayak</surname> <given-names>PK</given-names></name> <name><surname>Champaty</surname> <given-names>B</given-names></name></person-group>. <article-title>Smart attendance system.</article-title> <source><italic>Proceedings of the 2018 International conference on smart city and emerging technology (ICSCET).</italic></source> <publisher-loc>Piscataway, NJ</publisher-loc>: <publisher-name>IEEE</publisher-name> (<year>2018</year>). p. <fpage>1</fpage>&#x2013;<lpage>5</lpage>. <pub-id pub-id-type="doi">10.1109/ICSCET.2018.8537298</pub-id></citation></ref>
<ref id="B19"><label>19.</label><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Moshayedi</surname> <given-names>AJ</given-names></name> <name><surname>Sambo</surname> <given-names>SK</given-names></name> <name><surname>Kolahdooz</surname> <given-names>A</given-names></name></person-group>. <article-title>Design and development of cost-effective exergames for activity incrementation.</article-title> <source><italic>Proceedings of the 2022 2nd international conference on consumer electronics and computer engineering (ICCECE).</italic></source> <publisher-loc>Piscataway, NJ</publisher-loc>: <publisher-name>IEEE</publisher-name> (<year>2022</year>). p. <fpage>133</fpage>&#x2013;<lpage>7</lpage>. <pub-id pub-id-type="doi">10.1109/ICCECE54139.2022.9712844</pub-id></citation></ref>
<ref id="B20"><label>20.</label><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Arbain</surname> <given-names>N</given-names></name> <name><surname>Nordin</surname> <given-names>NF</given-names></name> <name><surname>Isa</surname> <given-names>NM</given-names></name> <name><surname>Saaidin</surname> <given-names>S</given-names></name></person-group>. <article-title>LAS: Web-based laboratory attendance system by integrating RFID-ARDUINO technology.</article-title> <source><italic>Proceedings of the 2014 2nd international conference on electrical, electronics and system engineering (ICEESE).</italic></source> <publisher-loc>Piscataway, NJ</publisher-loc>: <publisher-name>IEEE</publisher-name> (<year>2014</year>). p. <fpage>89</fpage>&#x2013;<lpage>94</lpage>. <pub-id pub-id-type="doi">10.1109/ICEESE.2014.7154601</pub-id></citation></ref>
<ref id="B21"><label>21.</label><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Asabere</surname> <given-names>P</given-names></name> <name><surname>Sekyere</surname> <given-names>F</given-names></name> <name><surname>Ofosu</surname> <given-names>W</given-names></name></person-group>. <article-title>Wireless biometric fingerprint attendance system using Arduino and MySQL database.</article-title> <source><italic>Proceedings of the International journal of computer science, engineering and applications (IJCSEA).</italic></source> <publisher-loc>Piscataway, NJ</publisher-loc>: <publisher-name>IEEE</publisher-name> (<year>2020</year>).</citation></ref>
<ref id="B22"><label>22.</label><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Gheisari</surname> <given-names>M</given-names></name> <name><surname>Wang</surname> <given-names>G</given-names></name> <name><surname>Bhuiyan</surname> <given-names>M</given-names></name> <name><surname>Zhang</surname> <given-names>W</given-names></name></person-group>. <article-title>Mapp: A modular arithmetic algorithm for privacy preserving in iot.</article-title> <source><italic>Proceedings of the 2017 IEEE international symposium on parallel and distributed processing with applications and 2017 IEEE international conference on ubiquitous computing and communications (ISPA/IUCC).</italic></source> <publisher-loc>Piscataway, NJ</publisher-loc>: <publisher-name>IEEE</publisher-name> (<year>2017</year>). p. <fpage>897</fpage>&#x2013;<lpage>903</lpage>.</citation></ref>
<ref id="B23"><label>23.</label><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Ashourian</surname> <given-names>M</given-names></name> <name><surname>Gheisari</surname> <given-names>M</given-names></name> <name><surname>Hashemi</surname> <given-names>A</given-names></name></person-group>. <article-title>An improved node scheduling scheme for resilient packet ring network.</article-title> <source><italic>Majlesi J Elec Eng.</italic></source> (<year>2015</year>) <volume>9</volume>:<issue>43</issue>.</citation></ref>
<ref id="B24"><label>24.</label><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Sharifzadeh</surname> <given-names>M</given-names></name> <name><surname>Bashash</surname> <given-names>K</given-names></name> <name><surname>Bashokian</surname> <given-names>S</given-names></name> <name><surname>Gheisari</surname> <given-names>M</given-names></name></person-group>. <article-title>A Comparison with two semantic sensor data storages in total data transmission.</article-title> <source><italic>arXiv</italic></source> [<comment>Preprint</comment>]. (<year>2014</year>).</citation></ref>
<ref id="B25"><label>25.</label><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Porkar</surname> <given-names>P</given-names></name> <name><surname>Fazli</surname> <given-names>M</given-names></name> <name><surname>Gheisari</surname> <given-names>M</given-names></name></person-group>. <article-title>Sensor networks challenges.</article-title> <source><italic>Proceedings of the 11th international conference on data networks, DNCOCO &#x2018;12.</italic></source> <publisher-loc>Malta</publisher-loc>: <publisher-name>DNCOCO</publisher-name> (<year>2012</year>).</citation></ref>
<ref id="B26"><label>26.</label><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Khajehyousefi</surname> <given-names>M</given-names></name></person-group>. <article-title>A Comparison with Three Proposed Sensors Data&#x2019;s Storages.</article-title> <source><italic>Proceedings of the international conference on advanced computer theory and engineering, 4th (ICACTE 2011).</italic></source> <publisher-loc>New York, NY</publisher-loc>: <publisher-name>ASME Press</publisher-name> (<year>2011</year>).</citation></ref>
<ref id="B27"><label>27.</label><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Gheisari</surname> <given-names>M</given-names></name> <name><surname>Esnaashari</surname> <given-names>M</given-names></name></person-group>. <article-title>A survey to face recognition algorithms: advantageous and disadvantageous.</article-title> <source><italic>J Modern Technol Eng</italic></source> (<year>2017</year>) <volume>2</volume>:<fpage>57</fpage>&#x2013;<lpage>65</lpage>.</citation></ref>
<ref id="B28"><label>28.</label><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Alzubi</surname> <given-names>JA</given-names></name> <name><surname>Yaghoubi</surname> <given-names>A</given-names></name> <name><surname>Gheisari</surname> <given-names>M</given-names></name> <name><surname>Qin</surname> <given-names>Y</given-names></name></person-group>. <article-title>Improve heteroscedastic discriminant analysis by using CBP algorithm.</article-title> In: <person-group person-group-type="editor"><name><surname>Vaidya</surname> <given-names>J</given-names></name> <name><surname>Li</surname> <given-names>J</given-names></name></person-group> <role>editors</role>. <source><italic>Algorithms and architectures for parallel processing. ICA3PP 2018. Lecture notes in computer science.</italic></source> (<volume>Vol. 11335</volume>), <publisher-loc>Cham</publisher-loc>: <publisher-name>Springer</publisher-name> (<year>2018</year>).</citation></ref>
<ref id="B29"><label>29.</label><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Noor</surname> <given-names>F</given-names></name> <name><surname>Sajid</surname> <given-names>A</given-names></name> <name><surname>Shah</surname> <given-names>S</given-names></name> <name><surname>Zaman</surname> <given-names>M</given-names></name> <name><surname>Gheisari</surname> <given-names>M</given-names></name> <name><surname>Mariappan</surname> <given-names>V</given-names></name></person-group>. <article-title>Bayesian estimation and prediction for Burr-Rayleigh mixture model using censored data.</article-title> <source><italic>Int J Commun Syst.</italic></source> (<year>2019</year>) <volume>2019</volume>:<issue>e4094</issue>. <pub-id pub-id-type="doi">10.1002/dac.4094</pub-id></citation></ref>
<ref id="B30"><label>30.</label><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Gheisari</surname> <given-names>M</given-names></name> <name><surname>Abbasi</surname> <given-names>A</given-names></name> <name><surname>Sayari</surname> <given-names>Z</given-names></name> <name><surname>Rizvi</surname> <given-names>Q</given-names></name> <name><surname>Asheralieva</surname> <given-names>A</given-names></name> <name><surname>Banu</surname> <given-names>S</given-names></name><etal/></person-group> <article-title>A survey on clustering algorithms in wireless sensor networks: Challenges, research, and trends.</article-title> <source><italic>Proceedings of the 2020 International computer symposium (ICS)</italic>.</source> <publisher-loc>Piscataway, NJ</publisher-loc>: <publisher-name>IEEE</publisher-name> (<year>2020</year>):<fpage>294</fpage>&#x2013;<lpage>9</lpage>.</citation></ref>
<ref id="B31"><label>31.</label><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Shao</surname> <given-names>Y</given-names></name> <name><surname>Wu</surname> <given-names>J</given-names></name> <name><surname>Ou</surname> <given-names>H</given-names></name> <name><surname>Pei</surname> <given-names>M</given-names></name> <name><surname>Liu</surname> <given-names>L</given-names></name> <name><surname>Movassagh</surname> <given-names>A</given-names></name><etal/></person-group> <article-title>Optimization of ultrasound information imaging algorithm in cardiovascular disease based on image enhancement.</article-title> <source><italic>Math Prob Eng.</italic></source> (<year>2021</year>) <volume>2021</volume>: <issue>5580630</issue>.</citation></ref>
<ref id="B32"><label>32.</label><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Mangla</surname> <given-names>M</given-names></name> <name><surname>Deokar</surname> <given-names>S</given-names></name> <name><surname>Akhare</surname> <given-names>R</given-names></name> <name><surname>Gheisari</surname> <given-names>M</given-names></name></person-group>. <article-title>A proposed framework for autonomic resource management in cloud computing environment.</article-title> <source><italic>Autonomic computing in cloud resource management in industry 4.0.</italic></source> <publisher-loc>Cham</publisher-loc>: <publisher-name>Springer&#x002A;</publisher-name> (<year>2021</year>). p. <fpage>177</fpage>&#x2013;<lpage>93</lpage>.</citation></ref>
<ref id="B33"><label>33.</label><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Li</surname> <given-names>L</given-names></name> <name><surname>Sharma</surname> <given-names>P</given-names></name> <name><surname>Gheisari</surname> <given-names>M</given-names></name> <name><surname>Sharma</surname> <given-names>A</given-names></name></person-group>. <article-title>Research on TCP performance model and transport agent architecture in broadband wireless network.</article-title> <source><italic>Scalable Comput.</italic></source> (<year>2021</year>) <volume>23</volume>:<fpage>193</fpage>&#x2013;<lpage>201</lpage>.</citation></ref>
<ref id="B34"><label>34.</label><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Raza</surname> <given-names>KA</given-names></name> <name><surname>Asheralieva</surname> <given-names>A</given-names></name> <name><surname>Karim</surname> <given-names>MM</given-names></name> <name><surname>Sharif</surname> <given-names>K</given-names></name> <name><surname>Gheisari</surname> <given-names>M</given-names></name> <name><surname>Khan</surname> <given-names>S</given-names></name></person-group>. <article-title>A novel forwarding and caching scheme for information-centric software-defined networks.</article-title> <source><italic>Proceedings of the 2021 International symposium on networks, computers and communications (ISNCC)</italic>.</source> <publisher-loc>Piscataway, NJ</publisher-loc>: <publisher-name>IEEE</publisher-name> (<year>2021</year>).</citation></ref>
<ref id="B35"><label>35.</label><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Gheisari</surname> <given-names>M</given-names></name> <name><surname>Safari</surname> <given-names>Z</given-names></name> <name><surname>Almasi</surname> <given-names>M</given-names></name> <name><surname>Sridharan</surname> <given-names>A</given-names></name> <name><surname>Ragesh</surname> <given-names>G</given-names></name> <name><surname>Liu</surname> <given-names>Y</given-names></name><etal/></person-group> <article-title>A novel enhanced algorithm for efficient human tracking.</article-title> <source><italic>Int J Inf Commun Technol.</italic></source> (<year>2022</year>) <volume>11</volume>:<fpage>1</fpage>&#x2013;<lpage>7</lpage>.</citation></ref>
<ref id="B36"><label>36.</label><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Abdullah</surname> <given-names>A</given-names></name> <name><surname>Hamza</surname> <given-names>A</given-names></name> <name><surname>Rashid</surname> <given-names>A</given-names></name> <name><surname>Sundas</surname> <given-names>I</given-names></name> <name><surname>Bader</surname> <given-names>A</given-names></name> <name><surname>Mehdi</surname> <given-names>G</given-names></name></person-group>. <article-title>Stress-relieving video game and its effects: A POMS case study.</article-title> <source><italic>Comput Intell Neurosci.</italic></source> (<year>2022</year>) <volume>11</volume>:<issue>2022</issue>. <pub-id pub-id-type="doi">10.1155/2022/4239536</pub-id></citation></ref>
<ref id="B37"><label>37.</label><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Alzubi</surname> <given-names>J</given-names></name> <name><surname>Movassagh</surname> <given-names>A</given-names></name> <name><surname>Gheisari</surname> <given-names>M</given-names></name> <name><surname>Najafabadi</surname> <given-names>H</given-names></name> <name><surname>Abbasi</surname> <given-names>A</given-names></name> <name><surname>Liu</surname> <given-names>Y</given-names></name><etal/></person-group> <article-title>A dynamic SDN-based privacy-preserving approach for smart city using trust technique.</article-title> <source><italic>Proceedings of the 2022 9th Iranian Joint Congress on Fuzzy and Intelligent Systems (CFIS).</italic></source> <publisher-loc>Piscataway, NJ</publisher-loc>: <publisher-name>IEEE</publisher-name> (<year>2022</year>). p. <fpage>1</fpage>&#x2013;<lpage>5</lpage>.</citation></ref>
<ref id="B38"><label>38.</label><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Yongsheng</surname> <given-names>R</given-names></name> <name><surname>Kosari</surname> <given-names>S</given-names></name> <name><surname>Gheisari</surname> <given-names>M</given-names></name></person-group>. <article-title>New results in vague incidence graphs with application.</article-title> <source><italic>J Funct Spaces.</italic></source> (<year>2022</year>) <volume>7</volume>:<issue>2022</issue>. <pub-id pub-id-type="doi">10.1155/2022/3475536</pub-id></citation></ref>
<ref id="B39"><label>39.</label><citation citation-type="journal"><person-group person-group-type="author"><name><surname>GhadakSaz</surname> <given-names>E.</given-names></name></person-group> <source><italic>Design, implement and compare two proposed sensor data&#x2019;s storages Named SemHD and SSW.</italic></source> <publisher-loc>Beijing</publisher-loc>: <publisher-name>Editor in Chief</publisher-name> (<year>2012</year>). <fpage>78</fpage> p.</citation></ref>
<ref id="B40"><label>40.</label><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Moshayedi</surname> <given-names>A</given-names></name> <name><surname>Roy</surname> <given-names>A</given-names></name> <name><surname>Liao</surname> <given-names>L</given-names></name></person-group>. <article-title>PID tuning method on AGV (automated guided vehicle) industrial robot.</article-title> <source><italic>J Simul Anal Novel Technol Mech Eng.</italic></source> (<year>2020</year>) <volume>12</volume>:<fpage>53</fpage>&#x2013;<lpage>66</lpage>.</citation></ref>
<ref id="B41"><label>41.</label><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Moshayedi</surname> <given-names>A</given-names></name> <name><surname>Gharpure</surname> <given-names>DC</given-names></name></person-group>. <article-title>Path and position monitoring tool for indoor robot application.</article-title> <source><italic>Int J Appl Electron Phys Robot.</italic></source> (<year>2013</year>) <volume>1</volume>:<fpage>10</fpage>&#x2013;<lpage>3</lpage>. <pub-id pub-id-type="doi">10.7575/aiac.ijaepr.v.1n.1p.10</pub-id></citation></ref>
<ref id="B42"><label>42.</label><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Moshayedi</surname> <given-names>A</given-names></name> <name><surname>Gharpure</surname> <given-names>D</given-names></name></person-group>. <article-title>Implementing breath to improve response of gas sensors for leak detection in plume tracker robots.</article-title> <source><italic>Proceedings of the third international conference on soft computing for problem solving.</italic></source> <publisher-loc>Piscataway, NJ</publisher-loc>: <publisher-name>IEEE</publisher-name> (<year>2014</year>). p. <fpage>337</fpage>&#x2013;<lpage>48</lpage>.</citation></ref>
<ref id="B43"><label>43.</label><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Abbasi</surname> <given-names>A</given-names></name> <name><surname>Moshayedi</surname> <given-names>A</given-names></name> <name><surname>Liao</surname> <given-names>L</given-names></name> <name><surname>Li</surname> <given-names>S</given-names></name></person-group>. <article-title>Path planning and trajectroy tracking of a mobile robot using bio-inspired optimization algorithms and PID control.</article-title> <source><italic>Proceedings of the 2019 IEEE international conference on computational intelligence and virtual environments for measurement systems and applications (CIVEMSA).</italic></source> <publisher-loc>Piscataway, NJ</publisher-loc>: <publisher-name>IEEE</publisher-name> (<year>2019</year>). <fpage>60</fpage> p.</citation></ref>
<ref id="B44"><label>44.</label><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Moshayedi</surname> <given-names>A</given-names></name> <name><surname>Gharpure</surname> <given-names>D</given-names></name></person-group>. <article-title>Development of position monitoring system for studying performance of wind tracking algorithms in robotics.</article-title> <source><italic>Proceedings of ROBOTIK 2012, 7th German conference.</italic></source> <publisher-loc>Piscataway, NJ</publisher-loc>: <publisher-name>IEEE</publisher-name> (<year>2012</year>). p. <fpage>1</fpage>&#x2013;<lpage>4</lpage>.</citation></ref>
<ref id="B45"><label>45.</label><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Moshayedi</surname> <given-names>AJ</given-names></name> <name><surname>Li</surname> <given-names>J</given-names></name> <name><surname>Liao</surname> <given-names>L</given-names></name></person-group>. <article-title>Simulation study and PID tune of automated guided vehicles (AGV).</article-title> <source><italic>2021 IEEE international conference on computational intelligence and virtual environments for measurement systems and applications (CIVEMSA).</italic></source> <publisher-loc>Piscataway, NJ</publisher-loc>: <publisher-name>IEEE</publisher-name> (<year>2021</year>). p. <fpage>1</fpage>&#x2013;<lpage>7</lpage>.</citation></ref>
<ref id="B46"><label>46.</label><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Moshayedi</surname> <given-names>A</given-names></name> <name><surname>Xu</surname> <given-names>G</given-names></name> <name><surname>Liao</surname> <given-names>L</given-names></name> <name><surname>Kolahdooz</surname> <given-names>A</given-names></name></person-group>. <article-title>Gentle survey on MIR industrial service robots: review &#x0026; design.</article-title> <source><italic>J Mod Process Manuf Prod.</italic></source> (<year>2021</year>) <volume>10</volume>:<fpage>31</fpage>&#x2013;<lpage>50</lpage>.</citation></ref>
<ref id="B47"><label>47.</label><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Abbasi</surname> <given-names>A</given-names></name> <name><surname>Zadeh</surname> <given-names>S</given-names></name> <name><surname>Yazdani</surname> <given-names>A</given-names></name></person-group>. <article-title>Feasibility assessment of Kian-I mobile robot for autonomous navigation.</article-title> <source><italic>Neural Comput Appl.</italic></source> (<year>2022</year>) <volume>34</volume>:<fpage>1199</fpage>&#x2013;<lpage>218</lpage>. <pub-id pub-id-type="doi">10.1007/s00521-021-06428-2</pub-id></citation></ref>
<ref id="B48"><label>48.</label><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Moshayedi</surname> <given-names>A</given-names></name> <name><surname>Gheibollahi</surname> <given-names>M</given-names></name> <name><surname>Liao</surname> <given-names>L</given-names></name></person-group>. <article-title>The quadrotor dynamic modeling and study of meta-heuristic algorithms performance on optimization of PID controller index to control angles and tracking the route.</article-title> <source><italic>IAES Int J Robot Autom.</italic></source> (<year>2020</year>) <volume>9</volume>:<issue>256</issue>. <pub-id pub-id-type="doi">10.11591/ijra.v9i4.pp256-270</pub-id></citation></ref>
<ref id="B49"><label>49.</label><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Moshayedi</surname> <given-names>A</given-names></name> <name><surname>Kazemi</surname> <given-names>E</given-names></name> <name><surname>Tabatabaei</surname> <given-names>M</given-names></name> <name><surname>Liao</surname> <given-names>L</given-names></name></person-group>. <article-title>Brief modeling equation for metal-oxide; TGS type gas sensors.</article-title> <source><italic>Filomat</italic></source> (<year>2020</year>) <volume>34</volume>:<fpage>4997</fpage>&#x2013;<lpage>5008</lpage>. <pub-id pub-id-type="doi">10.2298/FIL2015997M</pub-id></citation></ref>
<ref id="B50"><label>50.</label><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Zhang</surname> <given-names>X</given-names></name> <name><surname>Song</surname> <given-names>Z</given-names></name> <name><surname>Moshayedi</surname> <given-names>AJ</given-names></name></person-group>. <article-title>Security scheduling and transaction mechanism of virtual power plants based on dual blockchains.</article-title> <source><italic>J Cloud Comp.</italic></source> (<year>2022</year>) <volume>11</volume>:<issue>4</issue>. <pub-id pub-id-type="doi">10.1186/s13677-021-00273-3</pub-id></citation></ref>
<ref id="B51"><label>51.</label><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Moshayedi</surname> <given-names>A</given-names></name> <name><surname>Roy</surname> <given-names>A</given-names></name> <name><surname>Kolahdooz</surname> <given-names>A</given-names></name> <name><surname>Shuxin</surname> <given-names>Y</given-names></name></person-group>. <article-title>Deep learning application pros and cons over algorithm.</article-title> <source><italic>EAI Endorsed Trans AI Robot.</italic></source> (<year>2022</year>) <volume>1</volume>:<fpage>1</fpage>&#x2013;<lpage>13</lpage>. <pub-id pub-id-type="doi">10.4108/airo.v1i.19</pub-id></citation></ref>
<ref id="B52"><label>52.</label><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Moshayedi</surname> <given-names>A</given-names></name> <name><surname>Roy</surname> <given-names>A</given-names></name> <name><surname>Sambo</surname> <given-names>S</given-names></name> <name><surname>Zhong</surname> <given-names>Y</given-names></name> <name><surname>Liao</surname> <given-names>L</given-names></name></person-group>. <article-title>Review on: The service robot mathematical model.</article-title> <source><italic>EAI Endorsed Trans AI Robot.</italic></source> (<year>2022</year>) <volume>1</volume>:<fpage>1</fpage>&#x2013;<lpage>19</lpage>. <pub-id pub-id-type="doi">10.4108/airo.v1i.20</pub-id></citation></ref>
<ref id="B53"><label>53.</label><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Moshayedi</surname> <given-names>AJ</given-names></name> <name><surname>Hosseini</surname> <given-names>MS</given-names></name> <name><surname>Rezaee</surname> <given-names>F</given-names></name></person-group>. <article-title>WiFi based massager device with NodeMCU through arduino interpreter.</article-title> <source><italic>J Simul Anal Nov Technol Mech Eng.</italic></source> (<year>2019</year>) <volume>11</volume>:<fpage>73</fpage>&#x2013;<lpage>9</lpage>.</citation></ref>
</ref-list>
</back>
</article>
