INTRODUCTION INTRODUCTION OBJECTIVESOBJECTIVESSCOPE/LIMITSCOPE/LIMIT PROBLEM STATEMENTPROBLEM STATEMENTLITERATURE REVIEW LITERATURE REVIEW METHODOLOGYMETHODOLOGY PROGRESS OF PROJECTPROGRESS OF PROJECTCONCLUSIONCONCLUSION REFERENCESREFERENCES
•The security system by using biometric to access a system.
•The security system in market mostly base on RFID or password.
•Biometric is more safety and easier to use.
•Combination of three biometric.
The objectives of the Final Year Project titled as The objectives of the Final Year Project titled as mentioned are:mentioned are:
• To develop a real-time identification access system is reliability estimation techniques by considering the level of security and to repair the weakness of the programming.
•To build and develop protective a new stage of security system using Matlab and GUI .
•To propose reliability methods to improve the level of security system.
•To investigate the ability of the programming base on operation and performance.
SCOPE / LIMITSCOPE / LIMIT•Program use is Software Matlab.
•Device use thumbprint scanner, webcam with night vision, microphone with noise canceling.
•To protect from unauthorize people.
• Iris recognition is a method of biometric authentication that uses pattern-recognition techniques based on high-resolution images of the irises of an individual’s eyes.
• Voice Recognition is a biometric technology that uses individual’s voice for human identification and verification.
•Thumbprint Recognition is a biometric technology that scan the pattern of fingerprint for human identification and verification.
Block Diagram
The prototype
THE PROTOTYPE’s SYSTEM FLOWTHE PROTOTYPE’s SYSTEM FLOW
PROJECT PLANNING FOR FYP UNTIL THE END.PROJECT PLANNING FOR FYP UNTIL THE END.
Progress in Matlab GUI display
PROJECT PLANNING FOR FYP SEMESTER 1 (S1’20102)
Taking approx. Taking approx. 119 days 119 days
working day working day for FYP Sem.1for FYP Sem.1
• The product will be useful in protecting.
•To prevent trespasser happen.
• Improving security system by using biometric recognition.
• “Identity Theft Involving Elderly Victims” Retrieved on 6 February 2012 at http://epic.org/privacy/biometrics/testimony_071802.html
• “Biometric Recognition” Retrieved on 7 February, 2012 at http://biometric-recognition.blogspot.com/
• Stephen J. Chapman (fourth edition, 2008), “MATLAB Programing for Engineers”, Canada, THOMSON.
• Anil K. Jain, Patrick Flynn, and Arun A. Ross, (2008). “Handbook of Biometrics”, New York, USA: Springer Science + Business Media, LCC.
Top Related