250 research outputs found

    Design of an embedded iris recognition system for use with a multi-factor authentication system.

    Get PDF
    This paper describes in detail the design, manufacturing and testing of an embedded iris scanner for use with a multifactor authentication system. The design process for this project included hardware design from part selection to board design to populating. Additionally, this process included the entirety of the software development, though the iris recognition process was largely based on other works. The functional requirements for the overall multi-factor authentication system were to have three authentication methods with a thirty second window to complete all three. The system acceptance accuracy was required to be greater than 75%. Those requirements therefore dictate that the iris scanner module must also have an acceptance accuracy higher than 75% and perform iris recognition in a few seconds so that the user can gain admittance in the allotted window of time. While the hardware has been verified and tested, further development and testing is necessary on the software and image processing. This work is funded by the Department of Energy’s Kansas City National Security Campus, operated by Honeywell Federal Manufacturing & Technologies, LLC under contract number DE-NA0002839

    Development of CUiris: A Dark-Skinned African Iris Dataset for Enhancement of Image Analysis and Robust Personal Recognition

    Get PDF
    Iris recognition algorithms, especially with the emergence of large-scale iris-based identification systems, must be tested for speed and accuracy and evaluated with a wide range of templates – large size, long-range, visible and different origins. This paper presents the acquisition of eye-iris images of dark-skinned subjects in Africa, a predominant case of verydark- brown iris images, under near-infrared illumination. The peculiarity of these iris images is highlighted from the histogram and normal probability distribution of their grayscale image entropy (GiE) values, in comparison to Asian and Caucasian iris images. The acquisition of eye-images for the African iris dataset is ongoing and will be made publiclyavailable as soon as it is sufficiently populated

    Biometric Security: Are Inexpensive Biometric Devices Reliable Enough to Gain Wide-Spread Security Usage?

    Get PDF
    The ever growing need for security in today\u27 s world requires exploring the feasibility of various security methods to ensure the safety of the world\u27s population. With the tremendous growth of technology, e-commerce, and business globalization, society implements new methods to try to battle security problems. Technology advances has resulted in a number of inexpensive biometric devices to the marketplace. Two questions surface regarding this devices-are they reliable enough for general usage and will people be willing to use them? This research conducted a repeated design experiment to determine the effectiveness of four inexpensive biometric devices-three fingerprint readers and an iris scanner. Further, a questionnaire was designed to gain insights to the views of subjects using these biometric devices. On average, all the devices performed well for identification purposes-the fingerprint readers performing better than the iris scanner. The questionnaire revealed that most people prefer fingerprint readers over that of iris scanners and that although 60% of the people surveyed had heard of biometrics, only 21% of those surveyed had ever used a biometric device. The public does not feel that these devices provide complete security, but does provide a reliable means for identification

    A Review Paper on Biometric Recognition using Iris Scanner

    Get PDF
    The main purpose of the paper is assembling and developing an iris recognition system in order to verify uniqueness of the human eye of faculty in a college for attendance management system. This system based on biometrics and wireless technique solves the problem of spurious attendance and the trouble of laying the corresponding network. Here biometric recognition is performed with respect to iris because of its unique biological properties. The iris is unaffected by external environmental factors and remains stable over time. It can make the college staff attendance management more easy and effective. This paper includes image acquisition, the preprocessing system, segmentation, feature extraction and recognition

    Leveraging the Grid to Provide a Global Platform for Ubiquitous Computing Research

    Get PDF
    The requirement for distributed systems support for Ubicomp has led to the development of numerous platforms, each addressing a subset of the overall requirements of ubiquitous systems. In contrast, many other scientific disciplines have embraced the vision of a global distributed computing platform, i.e. the Grid. We believe that the Grid has the potential to evolve into an ideal platform for building ubiquitous computing applications. In this paper we explore in detail the areas of synergy between Grid computing and ubiquitous computing and highlight a series of research challenges in this space

    Thermal analysis of lithium ion battery-equipped smartphone explosions

    Get PDF
    Thermal management of mobile electronics has been carried out because performance of the application processor has increased and power dissipation in miniaturized devices is proportional to its functionalities. There have been various studies on thermal analyses related to mobile electronics with the objectives of improving analysis methodologies and cooling strategies to guarantee device safety. Despite these efforts, failure to control thermal energy, especially in smartphones, has resulted in explosions, because thermal behaviors in the device under various operating conditions have not been sufficiently conducted. Therefore, several scenarios that caused the failure in thermal management of smartphone was analyzed to provide improved insight into thermal design deducing the parameters, that affect the thermal management of device. Overcurrent in battery due to malfunction of battery management system or immoderate addition of functionalities to the application processor are considered as reliable causes leading to the recent thermal runaways and explosions. From the analyses, it was also confirmed that the heat generation of the battery, which have not been considered importantly in previous literature, has significant effect on thermal management, and heat spreading could be suppressed according to arrangement of AP and battery. The heat pipe, which is utilized as a cooling device in mobile electronics, was also included in the thermal analyses. Although the heat pipes have been expected to improve the thermal management in mobile electronics, it showed limited heat transfer capacity due to its operating conditions and miniaturization. The demonstrated results of our analysis warn against vulnerabilities of smartphones in terms of safety in design

    IOT based Security System for Auto Identifying Unlawful Activities using Biometric and Aadhar Card

    Get PDF
    In today’s era, where thefts are consecutively increasing, especially in banks, jewelry shops, stores, ATMs, etc, there is a need to either develop a new system or to improve the existing system, due to which the security in these areas can be enhanced. However, the traditional methods (CCTV cameras, alarm buttons) to handle the security issues in these areas are still available, but they have lots of limitations and drawbacks. So, in order to handle the security issues, this paper describes how the biometric and IoT (Internet of Things) techniques can greatly improve the existing traditional security system. Our proposed system uses biometric authentication using the fingerprint and iris pattern with the strength of IoT sensors, microcontroller and UIDAI aadhar server to enhance the security model and to cut the need of keeping extra employees in monitoring the security system

    Comparative Analysis of Iris Segmentation and Iris Feature Extraction Techniques

    Get PDF
    Iris recognition is identification and verification of an individual based on their respective unique iris patterns. This system is preferred because it is stable: Iris of an individual does not change by the passing of time; Unique: Each person has a different Iris pattern; Flexible: it can easily be incorporated into security systems; Reliable: No theft because people can�t create an iris of another person;In our survey project the processes of Iris segmentation and Feature Extraction have been studied in depth.In this survey paper the various techniques that are used in Iris segmentation and Feature extraction processes are compared and analysed and a conclusion is drawn from them

    Archaeology of the Moving Image (Volume 1, Summer 2022)

    Get PDF
    A compilation of postgraduate student research projects written between 2017 and 2021 for a module titled Archaeology of the Moving Image in the Department of Media, Communications and Cultural Studies at Goldsmiths, University of London. Archaeology of the Moving Image is a course that encourages students to undertake independent investigations of the relationship between the past, present and future of moving image culture
    corecore