Table of contents - Metrohm · PDF fileTable of contents 1 Table of contents TABLE OF CONTENTS
CONTENTS
description
Transcript of CONTENTS
![Page 1: CONTENTS](https://reader036.fdocuments.us/reader036/viewer/2022062517/56813c15550346895da58cb2/html5/thumbnails/1.jpg)
![Page 2: CONTENTS](https://reader036.fdocuments.us/reader036/viewer/2022062517/56813c15550346895da58cb2/html5/thumbnails/2.jpg)
INTRODUCTION INTRODUCTION OBJECTIVESOBJECTIVESSCOPE/LIMITSCOPE/LIMIT PROBLEM STATEMENTPROBLEM STATEMENTLITERATURE REVIEW LITERATURE REVIEW METHODOLOGYMETHODOLOGY PROGRESS OF PROJECTPROGRESS OF PROJECTCONCLUSIONCONCLUSION REFERENCESREFERENCES
![Page 3: CONTENTS](https://reader036.fdocuments.us/reader036/viewer/2022062517/56813c15550346895da58cb2/html5/thumbnails/3.jpg)
•The security system by using biometric to access a system.
•The security system in market mostly base on RFID or password.
•Biometric is more safety and easier to use.
•Combination of three biometric.
![Page 4: CONTENTS](https://reader036.fdocuments.us/reader036/viewer/2022062517/56813c15550346895da58cb2/html5/thumbnails/4.jpg)
![Page 5: CONTENTS](https://reader036.fdocuments.us/reader036/viewer/2022062517/56813c15550346895da58cb2/html5/thumbnails/5.jpg)
The objectives of the Final Year Project titled as The objectives of the Final Year Project titled as mentioned are:mentioned are:
• To develop a real-time identification access system is reliability estimation techniques by considering the level of security and to repair the weakness of the programming.
•To build and develop protective a new stage of security system using Matlab and GUI .
•To propose reliability methods to improve the level of security system.
•To investigate the ability of the programming base on operation and performance.
![Page 6: CONTENTS](https://reader036.fdocuments.us/reader036/viewer/2022062517/56813c15550346895da58cb2/html5/thumbnails/6.jpg)
SCOPE / LIMITSCOPE / LIMIT•Program use is Software Matlab.
•Device use thumbprint scanner, webcam with night vision, microphone with noise canceling.
•To protect from unauthorize people.
![Page 7: CONTENTS](https://reader036.fdocuments.us/reader036/viewer/2022062517/56813c15550346895da58cb2/html5/thumbnails/7.jpg)
![Page 8: CONTENTS](https://reader036.fdocuments.us/reader036/viewer/2022062517/56813c15550346895da58cb2/html5/thumbnails/8.jpg)
• Iris recognition is a method of biometric authentication that uses pattern-recognition techniques based on high-resolution images of the irises of an individual’s eyes.
![Page 9: CONTENTS](https://reader036.fdocuments.us/reader036/viewer/2022062517/56813c15550346895da58cb2/html5/thumbnails/9.jpg)
• Voice Recognition is a biometric technology that uses individual’s voice for human identification and verification.
![Page 10: CONTENTS](https://reader036.fdocuments.us/reader036/viewer/2022062517/56813c15550346895da58cb2/html5/thumbnails/10.jpg)
•Thumbprint Recognition is a biometric technology that scan the pattern of fingerprint for human identification and verification.
![Page 11: CONTENTS](https://reader036.fdocuments.us/reader036/viewer/2022062517/56813c15550346895da58cb2/html5/thumbnails/11.jpg)
Block Diagram
The prototype
![Page 12: CONTENTS](https://reader036.fdocuments.us/reader036/viewer/2022062517/56813c15550346895da58cb2/html5/thumbnails/12.jpg)
THE PROTOTYPE’s SYSTEM FLOWTHE PROTOTYPE’s SYSTEM FLOW
![Page 13: CONTENTS](https://reader036.fdocuments.us/reader036/viewer/2022062517/56813c15550346895da58cb2/html5/thumbnails/13.jpg)
PROJECT PLANNING FOR FYP UNTIL THE END.PROJECT PLANNING FOR FYP UNTIL THE END.
![Page 14: CONTENTS](https://reader036.fdocuments.us/reader036/viewer/2022062517/56813c15550346895da58cb2/html5/thumbnails/14.jpg)
Progress in Matlab GUI display
![Page 15: CONTENTS](https://reader036.fdocuments.us/reader036/viewer/2022062517/56813c15550346895da58cb2/html5/thumbnails/15.jpg)
PROJECT PLANNING FOR FYP SEMESTER 1 (S1’20102)
Taking approx. Taking approx. 119 days 119 days
working day working day for FYP Sem.1for FYP Sem.1
![Page 16: CONTENTS](https://reader036.fdocuments.us/reader036/viewer/2022062517/56813c15550346895da58cb2/html5/thumbnails/16.jpg)
• The product will be useful in protecting.
•To prevent trespasser happen.
• Improving security system by using biometric recognition.
![Page 17: CONTENTS](https://reader036.fdocuments.us/reader036/viewer/2022062517/56813c15550346895da58cb2/html5/thumbnails/17.jpg)
• “Identity Theft Involving Elderly Victims” Retrieved on 6 February 2012 at http://epic.org/privacy/biometrics/testimony_071802.html
• “Biometric Recognition” Retrieved on 7 February, 2012 at http://biometric-recognition.blogspot.com/
• Stephen J. Chapman (fourth edition, 2008), “MATLAB Programing for Engineers”, Canada, THOMSON.
• Anil K. Jain, Patrick Flynn, and Arun A. Ross, (2008). “Handbook of Biometrics”, New York, USA: Springer Science + Business Media, LCC.