1 / 17

CONTENTS

REAL-TIME IDENTIFICATION ACCESS SYSTEM FYP PRESENTATION SEMESTER 1 MUHAMMAD IZZUDDIB B ROSDI 51263209295. INTRODUCTION OBJECTIVES SCOPE/LIMIT PROBLEM STATEMENT LITERATURE REVIEW METHODOLOGY PROGRESS OF PROJECT CONCLUSION REFERENCES. CONTENTS.

kerem
Download Presentation

CONTENTS

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. REAL-TIME IDENTIFICATION ACCESS SYSTEMFYP PRESENTATION SEMESTER 1MUHAMMAD IZZUDDIB B ROSDI51263209295

  2. INTRODUCTION • OBJECTIVES • SCOPE/LIMIT • PROBLEM STATEMENT • LITERATURE REVIEW • METHODOLOGY • PROGRESS OF PROJECT • CONCLUSION • REFERENCES CONTENTS

  3. The security system by using biometric to access a system. • The security system in market mostly base on RFID or password. • Biometric is more safety and easier to use. • Combination of three biometric. INTRODUCTION

  4. OBJECTIVES

  5. The objectives of the Final Year Project titled as mentioned are: • To develop a real-time identification access system is reliability estimation techniques by considering the level of security and to repair the weakness of the programming. • To build and develop protective a new stage of security system using Matlab and GUI . • To propose reliability methods to improve the level of security system. • To investigate the ability of the programming base on operation and performance.

  6. SCOPE / LIMIT • Program use is Software Matlab. • Device use thumbprint scanner, webcam with night vision, microphone with noise canceling. • To protect from unauthorize people.

  7. Why Biometric recognition as a solution and for what reasons using this technology? • To solve the problem of thief identity that occur in security system using number as a code or RFID. • To improve the security level, with biometric recognition it cannot be easily hacked . • The RFID sometime cannot be read by the device, but with biometric the identity will be recognize from data base. PROBLEM STATEMENT

  8. Iris recognition is a method of biometric authentication that uses pattern-recognition techniques based on high-resolution images of the irises of an individual’s eyes. LITERATURE REVIEW

  9. Voice Recognition is a biometric technology that uses individual’s voice for human identification and verification.

  10. Thumbprint Recognition is a biometric technology that scan the pattern of fingerprint for human identification and verification.

  11. Block Diagram METHADOLOGY The prototype

  12. THE PROTOTYPE’s SYSTEM FLOW

  13. PROJECT PLANNING FOR FYP UNTIL THE END.

  14. Progress in Matlab GUI display

  15. PROGRESING OF THE PROJECT PROJECT PLANNING FOR FYP SEMESTER 1 (S1’20102) Taking approx. 119 days working day for FYP Sem.1

  16. CONCLUSION • The product will be useful in protecting. • To prevent trespasser happen. • Improving security system by using biometric recognition.

  17. CONCLUSION • “Identity Theft Involving Elderly Victims” Retrieved on 6 February 2012 at http://epic.org/privacy/biometrics/testimony_071802.html • “Biometric Recognition” Retrieved on 7 February, 2012 at http://biometric-recognition.blogspot.com/ • Stephen J. Chapman (fourth edition, 2008), “MATLAB Programing for Engineers”, Canada, THOMSON. • Anil K. Jain, Patrick Flynn, and Arun A. Ross, (2008). “Handbook of Biometrics”, New York, USA: Springer Science + Business Media, LCC.

More Related