Biometric Security System Study
VerifiedAdded on  2020/10/04
|9
|1488
|451
AI Summary
This assignment involves a study on biometric security systems, specifically focusing on iris recognition as a biometric for identity verification. The study outlines the importance of data privacy and protection through regulations such as the data privacy act. A detailed project plan is provided, including deliverables, work breakdown structure, and Gantt chart. The study also reviews literature on iris recognition systems and their implications.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Uses of iris scanner in
airports
airports
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Table of Contents
Rationale..........................................................................................................................................1
Supervisor approval.........................................................................................................................1
Research Questions..........................................................................................................................1
Conceptual or Theoretical Framework............................................................................................1
Methodology....................................................................................................................................2
Project Plan......................................................................................................................................3
REFERENCES................................................................................................................................7
Rationale..........................................................................................................................................1
Supervisor approval.........................................................................................................................1
Research Questions..........................................................................................................................1
Conceptual or Theoretical Framework............................................................................................1
Methodology....................................................................................................................................2
Project Plan......................................................................................................................................3
REFERENCES................................................................................................................................7
TITLE - Uses of iris scanner in airports
Project blog
Project blog entries
Rationale
Problem domain- Technological advancement have benefited in maintaining security of
airports, railways, etc. it has lead to development of software and applications through which
security is ensured. The iris scanner is becoming popular in present era. They are been installed
in many places like in railways, on roads, etc. which has benefited in securing that place. This
technology is now used by companies in small devices.
Purpose and justification- The purpose of undertaking this project to analyse how iris scanner
will help in ensuring security of airports. Moreover, what guidelines or policies are followed in
monitoring airports security. Furthermore, what measures or actions are taken to maintain
security of iris scanner. However, what processes are installed and how overall checking of
individual identity is done with help of this technology.
Supervisor approval
Research Questions
1. What is the concept of iris scanner?
2. How iris scanner helps in maintaining airport security?
3. How monitoring and storing of data and information is done?
Conceptual or Theoretical Framework
This project is going to focus on different themes or concepts related to use of iris scanner in
airports. They are as follows :-
Concept of iris scanner
In this study scholar will analyse overall concept of iris scanner (Bopche & et.a.l., 2017).
Also, it will be examined about from where this technology have emerged and in what devices it
has been implemented and how it is successfully working.
Functioning of iris scanner
The research will also investigate how iris scanner works and what is its overall
procedure or process. Besides this, it will be analysed that how scanning is done and data and
information flows from device to database. Furthermore, it
1
Project blog
Project blog entries
Rationale
Problem domain- Technological advancement have benefited in maintaining security of
airports, railways, etc. it has lead to development of software and applications through which
security is ensured. The iris scanner is becoming popular in present era. They are been installed
in many places like in railways, on roads, etc. which has benefited in securing that place. This
technology is now used by companies in small devices.
Purpose and justification- The purpose of undertaking this project to analyse how iris scanner
will help in ensuring security of airports. Moreover, what guidelines or policies are followed in
monitoring airports security. Furthermore, what measures or actions are taken to maintain
security of iris scanner. However, what processes are installed and how overall checking of
individual identity is done with help of this technology.
Supervisor approval
Research Questions
1. What is the concept of iris scanner?
2. How iris scanner helps in maintaining airport security?
3. How monitoring and storing of data and information is done?
Conceptual or Theoretical Framework
This project is going to focus on different themes or concepts related to use of iris scanner in
airports. They are as follows :-
Concept of iris scanner
In this study scholar will analyse overall concept of iris scanner (Bopche & et.a.l., 2017).
Also, it will be examined about from where this technology have emerged and in what devices it
has been implemented and how it is successfully working.
Functioning of iris scanner
The research will also investigate how iris scanner works and what is its overall
procedure or process. Besides this, it will be analysed that how scanning is done and data and
information flows from device to database. Furthermore, it
1
Benefits of iris scanner in security
Another concept that will be covered in project is benefits of implementing iris scanner in
airports. In this it will be explained about how this technology will ease security checking
process and issue boarding pass. Furthermore, how technology is going to transform airport
security.
Threats related to technology
At last scholar will explore what are different threats related to implementation of iris
scanner. Also, the security can be breached through unauthorised access. In addition to it, what
issues or problems can occur in the future and what measures or actions must be taken in order to
maintain security.
The advancement is technology has revolutionized the life of human beings. It has provided
advance tools and equipments which has saved time and allowed people to communicate with
each other. Moreover, technology has automated almost every task ranging from unlocking of
smart phones to driving car. In present time technology is highly been used in maintaining
security in many areas like army, business data and information, railways, etc.
Matin & et.a.l., 2016, examined that a new technology has emerged named as iris scanner
that is based on concept of recognising human facial expression. This technology is highly been
implemented by companies in ensuring their security. Firstly, it is been installed in smart phones
that allows user to unlock just by scanning eyes. An iris scanner uses mathematic pattern
recognition to identify either one or both eyes of person from a certain distance. Through this,
each individual eye are scanned.
As said by Aloudat, Michael & Abbas, 2016, in airports a lot of passengers travel daily
from one place to another. Therefore, it is necessary to ensure security. A passenger has to go
through different types of processes. It includes issue of boarding pass, security check, etc.
Hence, in order to maintain security and easy checking iris scanner can be used. It will help in
quick and secured scanning and matching with person details. Through this, person identity will
be verified. There are many benefits of installing iris scanner at airport. It automatically scan
person eye which makes
Methodology
Analysis of sources of information-
2
Another concept that will be covered in project is benefits of implementing iris scanner in
airports. In this it will be explained about how this technology will ease security checking
process and issue boarding pass. Furthermore, how technology is going to transform airport
security.
Threats related to technology
At last scholar will explore what are different threats related to implementation of iris
scanner. Also, the security can be breached through unauthorised access. In addition to it, what
issues or problems can occur in the future and what measures or actions must be taken in order to
maintain security.
The advancement is technology has revolutionized the life of human beings. It has provided
advance tools and equipments which has saved time and allowed people to communicate with
each other. Moreover, technology has automated almost every task ranging from unlocking of
smart phones to driving car. In present time technology is highly been used in maintaining
security in many areas like army, business data and information, railways, etc.
Matin & et.a.l., 2016, examined that a new technology has emerged named as iris scanner
that is based on concept of recognising human facial expression. This technology is highly been
implemented by companies in ensuring their security. Firstly, it is been installed in smart phones
that allows user to unlock just by scanning eyes. An iris scanner uses mathematic pattern
recognition to identify either one or both eyes of person from a certain distance. Through this,
each individual eye are scanned.
As said by Aloudat, Michael & Abbas, 2016, in airports a lot of passengers travel daily
from one place to another. Therefore, it is necessary to ensure security. A passenger has to go
through different types of processes. It includes issue of boarding pass, security check, etc.
Hence, in order to maintain security and easy checking iris scanner can be used. It will help in
quick and secured scanning and matching with person details. Through this, person identity will
be verified. There are many benefits of installing iris scanner at airport. It automatically scan
person eye which makes
Methodology
Analysis of sources of information-
2
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Here, the information analyzed will include proper end notes after paragraph where it is
needed. Apart from it, proper references will be done along with their citations. Moreover, it will
be ensued that only APA style references are included. This will make the entire report authentic.
Research method-
Research method is considered as selecting specific methods gathering information and
performing analysis. It can be defined as a general procedure where researchers have to answer
the questions. There are two research methods that are qualitative and quantitative. For present
report, scholar will use qualitative method. This will enable in gathering theoretical knowledge
about use of iris scanner at airports and how it has helped in maintaining security.
Data collection or systems design methods
Data collection- The process through which data is gathered to generate precise and accurate
outcomes. Primary and secondary are two methods which are used in this. In context to present
study, researcher will use secondary method to collect data (Prasad & Baswaraj, 2018). For this
journals, article, etc. related to topic will be studied and analyzed.
Ethical Issues
In order to conduct study in ethical manner scholar will follow certain ethics. First of all,
privacy of data will be maintained by storing it into systems and database. Secondly, outcomes
will not be shared or disclosed to any other person. Besides this, access to data and information
will only be given to authorized person.
Compliance Requirement
Here, several regulations and standards which are been formed by government or industry
will be followed and maintained. For example- data privacy act, this will be followed to ensure
data is protected and secured.
Project Plan
Deliverables-
In order to conduct study, many tools and equipments are required. The present study will
be done by using various journals, articles, etc. with their bibliography. Furthermore, a report
will be developed along with presentation.
Work breakdown structure (WBS)
Activiti Week 1 Week Week Week Week Week Week 7 Week Week Week Wee
3
needed. Apart from it, proper references will be done along with their citations. Moreover, it will
be ensued that only APA style references are included. This will make the entire report authentic.
Research method-
Research method is considered as selecting specific methods gathering information and
performing analysis. It can be defined as a general procedure where researchers have to answer
the questions. There are two research methods that are qualitative and quantitative. For present
report, scholar will use qualitative method. This will enable in gathering theoretical knowledge
about use of iris scanner at airports and how it has helped in maintaining security.
Data collection or systems design methods
Data collection- The process through which data is gathered to generate precise and accurate
outcomes. Primary and secondary are two methods which are used in this. In context to present
study, researcher will use secondary method to collect data (Prasad & Baswaraj, 2018). For this
journals, article, etc. related to topic will be studied and analyzed.
Ethical Issues
In order to conduct study in ethical manner scholar will follow certain ethics. First of all,
privacy of data will be maintained by storing it into systems and database. Secondly, outcomes
will not be shared or disclosed to any other person. Besides this, access to data and information
will only be given to authorized person.
Compliance Requirement
Here, several regulations and standards which are been formed by government or industry
will be followed and maintained. For example- data privacy act, this will be followed to ensure
data is protected and secured.
Project Plan
Deliverables-
In order to conduct study, many tools and equipments are required. The present study will
be done by using various journals, articles, etc. with their bibliography. Furthermore, a report
will be developed along with presentation.
Work breakdown structure (WBS)
Activiti Week 1 Week Week Week Week Week Week 7 Week Week Week Wee
3
es 2 3 4 5 6 8 9 10 k 11
Definin
g
research
proposal
Definin
g
backgro
und or
rational
e for
study
Literatu
re
review
Decidin
g aims
and
objectiv
es
Designi
ng
question
naire
Gatheri
ng data
Examini
ng the
data
4
Definin
g
research
proposal
Definin
g
backgro
und or
rational
e for
study
Literatu
re
review
Decidin
g aims
and
objectiv
es
Designi
ng
question
naire
Gatheri
ng data
Examini
ng the
data
4
Finding
Recom
mendati
on and
conclusi
on
Final
Submiss
ion
Risk Analysis
There exists several types of risks in completing a project. Therefore, in order to mitigate
it an analysis is done which is as follows :-
Type of risk Probability
(1= low and 5 = high)
Measures taken
Loss of data 4 The data will be stored in
server and database. Also, its
backup will be frequently
taken.
Lack of resources 3 Here, backup of resources will
be made.
Duration- The total duration of study will be 11 weeks.
Gantt chart
5
Recom
mendati
on and
conclusi
on
Final
Submiss
ion
Risk Analysis
There exists several types of risks in completing a project. Therefore, in order to mitigate
it an analysis is done which is as follows :-
Type of risk Probability
(1= low and 5 = high)
Measures taken
Loss of data 4 The data will be stored in
server and database. Also, its
backup will be frequently
taken.
Lack of resources 3 Here, backup of resources will
be made.
Duration- The total duration of study will be 11 weeks.
Gantt chart
5
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Task
Mode Task Name Duration Start Finish Predecessors
Auto
Scheduled
Defining research
proposal 3 days Wed 3/27/19 Fri 3/29/19
Auto
Scheduled Rationale for study 3 days Mon 4/1/19 Wed 4/3/19 1
Auto
Scheduled Literature review 2 days Thu 4/4/19 Fri 4/5/19 2
Auto
Scheduled Aims and objectives 2 days Mon 4/8/19 Tue 4/9/19 2,3
Auto
Scheduled Designing questionnaire 3 days Wed 4/10/19 Fri 4/12/19 3,4
Auto
Scheduled Gathering data 4 days Mon 4/15/19 Thu 4/18/19 4,5
Auto
Scheduled Analyzing data 3 days Fri 4/19/19 Tue 4/23/19 6
Auto
Scheduled Findings 3 days Wed 4/24/19 Fri 4/26/19 6,7
Auto
Scheduled
Recommendation and
conclusion 2 days Mon 4/29/19 Tue 4/30/19 8
Auto
Scheduled Final Submission 1 day Wed 5/1/19 Wed 5/1/19 9
6
Mode Task Name Duration Start Finish Predecessors
Auto
Scheduled
Defining research
proposal 3 days Wed 3/27/19 Fri 3/29/19
Auto
Scheduled Rationale for study 3 days Mon 4/1/19 Wed 4/3/19 1
Auto
Scheduled Literature review 2 days Thu 4/4/19 Fri 4/5/19 2
Auto
Scheduled Aims and objectives 2 days Mon 4/8/19 Tue 4/9/19 2,3
Auto
Scheduled Designing questionnaire 3 days Wed 4/10/19 Fri 4/12/19 3,4
Auto
Scheduled Gathering data 4 days Mon 4/15/19 Thu 4/18/19 4,5
Auto
Scheduled Analyzing data 3 days Fri 4/19/19 Tue 4/23/19 6
Auto
Scheduled Findings 3 days Wed 4/24/19 Fri 4/26/19 6,7
Auto
Scheduled
Recommendation and
conclusion 2 days Mon 4/29/19 Tue 4/30/19 8
Auto
Scheduled Final Submission 1 day Wed 5/1/19 Wed 5/1/19 9
6
REFERENCES
Books and Journals
Bopche, H. S. & et.a.l., (2017). Biometric Security System Using Iris Recognition. International
Journal of Electronics, Communication and Soft Computing Science & Engineering
(IJECSCSE), 31-35.
Aloudat, A., Michael, K., & Abbas, R. (2016). The Implications of Iris-Recognition
Technologies: Will our eyes be our keys?. IEEE Consumer Electronics Magazine, 5(3),
95-102.
Matin, A. & et.a.l., (2016, December). Human iris as a biometric for identity verification.
In 2016 2nd International Conference on Electrical, Computer & Telecommunication
Engineering (ICECTE) (pp. 1-4). IEEE.
Prasad, P. S., & Baswaraj, D. (2018, January). Iris recognition systems: A review.
In International Conference on Communications and Cyber Physical Engineering
2018 (pp. 521-527). Springer, Singapore.
7
Books and Journals
Bopche, H. S. & et.a.l., (2017). Biometric Security System Using Iris Recognition. International
Journal of Electronics, Communication and Soft Computing Science & Engineering
(IJECSCSE), 31-35.
Aloudat, A., Michael, K., & Abbas, R. (2016). The Implications of Iris-Recognition
Technologies: Will our eyes be our keys?. IEEE Consumer Electronics Magazine, 5(3),
95-102.
Matin, A. & et.a.l., (2016, December). Human iris as a biometric for identity verification.
In 2016 2nd International Conference on Electrical, Computer & Telecommunication
Engineering (ICECTE) (pp. 1-4). IEEE.
Prasad, P. S., & Baswaraj, D. (2018, January). Iris recognition systems: A review.
In International Conference on Communications and Cyber Physical Engineering
2018 (pp. 521-527). Springer, Singapore.
7
1 out of 9
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
 +13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024  |  Zucol Services PVT LTD  |  All rights reserved.