Biometrics Smart Home Automation: A Comprehensive Research Report
VerifiedAdded on 2022/08/20
|35
|10751
|12
Report
AI Summary
This research report, authored by Siddharth Mehta, investigates the application of biometrics in smart home automation. It explores various biometric technologies, including hand geometry, voice control, facial scan, fingerprint, and iris scanning, highlighting their potential benefits in enhancing home security, improving energy conservation, and centralizing home appliance management. The report delves into the integration of biometrics, potential issues, and security concerns, while also proposing a method for future work. It provides a detailed analysis of the research problem, research questions, and types of biometric technologies, along with an abstract, introduction, objectives, significance of the research, and conclusions. The report also includes relevant figures and references, offering a comprehensive overview of the subject.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.

1/29/2020
Biometrics
Smart Home Automation by Biometrics
Name of the student: Siddharth Mehta
Student Id: 4580480
Supervisor Name: Farhad Ahmed
Biometrics
Smart Home Automation by Biometrics
Name of the student: Siddharth Mehta
Student Id: 4580480
Supervisor Name: Farhad Ahmed
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

Table of Contents
Abstract............................................................................................................................................3
Introduction......................................................................................................................................4
Objectives........................................................................................................................................4
Significance of the research.............................................................................................................5
Research problem............................................................................................................................5
Research Questions..........................................................................................................................6
Types of Biometric Technologies....................................................................................................6
Hand geometry.............................................................................................................................7
Voice control................................................................................................................................8
Facial scan....................................................................................................................................9
Fingerprint and Iris scanning.....................................................................................................13
Potential benefits...........................................................................................................................15
Enhancement of security at home..............................................................................................16
Dynamic for the addition of extra components..........................................................................16
Improved energy conservation...................................................................................................17
Central management of all the home appliances and devices....................................................17
Enhanced machine functionality................................................................................................17
Direction on home management................................................................................................17
Smart Home Automation...............................................................................................................18
Transforming and integrating your biometrics capability.............................................................20
Systems integration expertise.....................................................................................................22
Issues in Integrating Biometrics.................................................................................................23
Integrated Biometric Technology Development........................................................................24
Device Capabilities.................................................................................................................24
Development Issues................................................................................................................24
Support Issues.........................................................................................................................24
Cost issues in Biometrics...............................................................................................................25
Security concerns...........................................................................................................................26
Legal and ethical issues.................................................................................................................26
1
Abstract............................................................................................................................................3
Introduction......................................................................................................................................4
Objectives........................................................................................................................................4
Significance of the research.............................................................................................................5
Research problem............................................................................................................................5
Research Questions..........................................................................................................................6
Types of Biometric Technologies....................................................................................................6
Hand geometry.............................................................................................................................7
Voice control................................................................................................................................8
Facial scan....................................................................................................................................9
Fingerprint and Iris scanning.....................................................................................................13
Potential benefits...........................................................................................................................15
Enhancement of security at home..............................................................................................16
Dynamic for the addition of extra components..........................................................................16
Improved energy conservation...................................................................................................17
Central management of all the home appliances and devices....................................................17
Enhanced machine functionality................................................................................................17
Direction on home management................................................................................................17
Smart Home Automation...............................................................................................................18
Transforming and integrating your biometrics capability.............................................................20
Systems integration expertise.....................................................................................................22
Issues in Integrating Biometrics.................................................................................................23
Integrated Biometric Technology Development........................................................................24
Device Capabilities.................................................................................................................24
Development Issues................................................................................................................24
Support Issues.........................................................................................................................24
Cost issues in Biometrics...............................................................................................................25
Security concerns...........................................................................................................................26
Legal and ethical issues.................................................................................................................26
1

Proposed Method and Future Work...............................................................................................27
Conclusions....................................................................................................................................28
References......................................................................................................................................30
Table of figures
Figure 1: Hand geometry recognition..........................................................................................................8
Figure 2: Voice Controlled Home Automation System...............................................................................8
Figure 3: Facial recognition.......................................................................................................................10
Figure 4: Fingerprint recognition...............................................................................................................14
Figure 5: Types of fingerprints..................................................................................................................15
Figure 6: Thumbprint door scanner...........................................................................................................16
Figure 7: Elements of a Smart Home.........................................................................................................19
2
Conclusions....................................................................................................................................28
References......................................................................................................................................30
Table of figures
Figure 1: Hand geometry recognition..........................................................................................................8
Figure 2: Voice Controlled Home Automation System...............................................................................8
Figure 3: Facial recognition.......................................................................................................................10
Figure 4: Fingerprint recognition...............................................................................................................14
Figure 5: Types of fingerprints..................................................................................................................15
Figure 6: Thumbprint door scanner...........................................................................................................16
Figure 7: Elements of a Smart Home.........................................................................................................19
2

Abstract
The concept of biometric authentication came into the scenario owing to the loopholes
present in the structural framework of face recognition fetching the purpose of authentication.
Biometrics, which is also referred to as biometric authentication, is the process of establishing
the identity of an individual based on the behavioral and physiological characteristics, also
known as the identifiers or traits. This report aims to highlight the contrasting features and
aspects of a biometric system of authentication for the purpose of rendering security to the
residential complex and dwellings to combat the unauthorized access of the intruders,
trespassing in the properties of others. This report concludes the necessity of implementing
biometrics for the purpose of rendering A-grade protection to the dwellings and the residences
from the external intruders. This report has performed a thorough qualitative analysis of the
concerned topic based on real-time evidence and data collection from an authentic source,
which is free from any sort of manipulation and biasness.
Keywords: Biometric, fingerprinting, face recognition, identifiers, traits, qualitative analysis.
3
The concept of biometric authentication came into the scenario owing to the loopholes
present in the structural framework of face recognition fetching the purpose of authentication.
Biometrics, which is also referred to as biometric authentication, is the process of establishing
the identity of an individual based on the behavioral and physiological characteristics, also
known as the identifiers or traits. This report aims to highlight the contrasting features and
aspects of a biometric system of authentication for the purpose of rendering security to the
residential complex and dwellings to combat the unauthorized access of the intruders,
trespassing in the properties of others. This report concludes the necessity of implementing
biometrics for the purpose of rendering A-grade protection to the dwellings and the residences
from the external intruders. This report has performed a thorough qualitative analysis of the
concerned topic based on real-time evidence and data collection from an authentic source,
which is free from any sort of manipulation and biasness.
Keywords: Biometric, fingerprinting, face recognition, identifiers, traits, qualitative analysis.
3
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

Introduction
This is one of the new advances in technology that the internet of things has been able to
come into significant play. This is a system that has been able to interlink devices and machines
with humans with the use of unique identifiers such as voice, iris, and face without having the
necessity of interaction of the person and the computer. There are many technologies involving
biometrics control that have now been integrated into the smart home systems.
Biometric systems offer many benefits as compared to the traditional authentication
systems. The biometric systems are more reliable and efficient than the password system. This is
because the biometric identifiers or traits cannot be forgotten or lost, and at the same time, they
are difficult to share, copy, and distribute. The biometric systems require the individual to the
individual to be authenticated to be present at the point and time of authentication. Hence, a
biometric system is a powerful alternative to traditional authentication systems (Dharavath &
Talukdar, 2013).
This report has played out an intensive subjective examination on the concerned point
dependent on ongoing confirmations and information gathering from a genuine source, which is
free from any sorts of control and biasness. The report incorporates all the necessary
methodologies and tools for the purpose of biometric authentication. This includes the
authentication based on-retina scanning, fingerprint scanning, voice recognition, and facial
recognition.
Objectives
This report aims to highlight the contrasting features and aspects of a biometric system of
authentication for the purpose of rendering security to the residential complex and dwellings to
combat the unauthorized access of the intruders, trespassing in the properties of others. This
study has performed a thorough and profound analysis of the following scenario incorporating
the positive aspects of the applied technology as well as the vulnerabilities embedded within the
architecture.
4
This is one of the new advances in technology that the internet of things has been able to
come into significant play. This is a system that has been able to interlink devices and machines
with humans with the use of unique identifiers such as voice, iris, and face without having the
necessity of interaction of the person and the computer. There are many technologies involving
biometrics control that have now been integrated into the smart home systems.
Biometric systems offer many benefits as compared to the traditional authentication
systems. The biometric systems are more reliable and efficient than the password system. This is
because the biometric identifiers or traits cannot be forgotten or lost, and at the same time, they
are difficult to share, copy, and distribute. The biometric systems require the individual to the
individual to be authenticated to be present at the point and time of authentication. Hence, a
biometric system is a powerful alternative to traditional authentication systems (Dharavath &
Talukdar, 2013).
This report has played out an intensive subjective examination on the concerned point
dependent on ongoing confirmations and information gathering from a genuine source, which is
free from any sorts of control and biasness. The report incorporates all the necessary
methodologies and tools for the purpose of biometric authentication. This includes the
authentication based on-retina scanning, fingerprint scanning, voice recognition, and facial
recognition.
Objectives
This report aims to highlight the contrasting features and aspects of a biometric system of
authentication for the purpose of rendering security to the residential complex and dwellings to
combat the unauthorized access of the intruders, trespassing in the properties of others. This
study has performed a thorough and profound analysis of the following scenario incorporating
the positive aspects of the applied technology as well as the vulnerabilities embedded within the
architecture.
4

Significance of the research
The significance of the research is profound and extensive. The significance is summarized in
the subsequent section:
a) The face recognition property of the biometric authentication is significant, owing to the
fact that the facial postures vary for individuals. Hence, this is very authentic for the
purpose of identity verification of the individuals.
b) The property of recognition of the retina is the most outstanding procedure. The retina of
an individual, the orientation of the eyeball, the alignment of the lens, the distribution of
the rod and the cone cells, the viscosity of the aqueous humor, and the category of the iris
is the unique property of an individual. Hence, the forging of the above-mentioned
parameters is very difficult. Hence, the system deploying the retina verification is very
authentic in regards to rendering security and imparts a robustness to the infrastructure of
the security systems of the residences.
c) The voice recognition parameter of the biometric authentication is also significant. This
procedure compares the voice of the individual to that recorded in the database and grants
access only in the case of a 100 percent match. Hence, this approach is also enticing.
Finally, comes the fingerprint recognition. The application of the fingerprint recognition is
perhaps the second durable method of authentication in the chronology after the retina
recognition. The fingerprint for an individual is the unique property of an individual. The pattern
of a fingerprint is diversified for different individuals. Even the fingerprint of different fingers is
also different. Hence, the methodology is appropriate for the authentication purpose
Research problem
There are 3 contrasting problems associated with biometric authentication. They are summarized
below:
a) Although it may seem that the fingerprint and the facial properties of individuals are
unique properties of the individuals. They cannot be forged as fingerprints, and the facial
properties cannot be replicated. However, the cyber predators are capable enough to gain
access over these properties as well through the implementation of the brute force attacks
and phishing activities. The facial properties of the individuals like the eyes, ears and
5
The significance of the research is profound and extensive. The significance is summarized in
the subsequent section:
a) The face recognition property of the biometric authentication is significant, owing to the
fact that the facial postures vary for individuals. Hence, this is very authentic for the
purpose of identity verification of the individuals.
b) The property of recognition of the retina is the most outstanding procedure. The retina of
an individual, the orientation of the eyeball, the alignment of the lens, the distribution of
the rod and the cone cells, the viscosity of the aqueous humor, and the category of the iris
is the unique property of an individual. Hence, the forging of the above-mentioned
parameters is very difficult. Hence, the system deploying the retina verification is very
authentic in regards to rendering security and imparts a robustness to the infrastructure of
the security systems of the residences.
c) The voice recognition parameter of the biometric authentication is also significant. This
procedure compares the voice of the individual to that recorded in the database and grants
access only in the case of a 100 percent match. Hence, this approach is also enticing.
Finally, comes the fingerprint recognition. The application of the fingerprint recognition is
perhaps the second durable method of authentication in the chronology after the retina
recognition. The fingerprint for an individual is the unique property of an individual. The pattern
of a fingerprint is diversified for different individuals. Even the fingerprint of different fingers is
also different. Hence, the methodology is appropriate for the authentication purpose
Research problem
There are 3 contrasting problems associated with biometric authentication. They are summarized
below:
a) Although it may seem that the fingerprint and the facial properties of individuals are
unique properties of the individuals. They cannot be forged as fingerprints, and the facial
properties cannot be replicated. However, the cyber predators are capable enough to gain
access over these properties as well through the implementation of the brute force attacks
and phishing activities. The facial properties of the individuals like the eyes, ears and
5

nose are exposed to the external environment and hence it is not a big deal for the cyber
predators to replicate the same through the implementation of ultra-sensor-based
technologies.
b) The fingerprint of an individual can be easily replicated through the prototyping
techniques as fingerprint gets recorded in certain devices when it comes to physical
contact with the fingerprint of the individuals. The software deployed for the purpose of
imitating the fingerprint of the individuals is the VeriFinger software.
c) The vulnerability of the voice recognition system lies in the fact that the voice can be
imitated through the recording activities and can be used for the purpose of forgery,
thereby gaining unauthorized access over the restricted property of the individuals.
Research Questions
This study was guided by the following research questions;
a) What are the biometric systems?
b) What are the benefits of implementing an unautomated biometric system in the
residential and commercial dwellings?
c) What are the behavioural and psychological traits which are used in the biometric
identification systems?
d) How does the automated biometric system work?
e) Which are the commonly used biometric systems in the current world and their benefits?
f) How can an automated biometric system be implemented in a residential and a
commercial dwelling?
Types of Biometric Technologies
Biometric referrers to an automated application of the behavioral or physiological
characteristics to establish or verify the identity of an individual. Many aspects of this definition
need a lot of elaboration. The biometric traits are divided into two broad categories. I.e.
a) Behavior
b) Physiological
6
predators to replicate the same through the implementation of ultra-sensor-based
technologies.
b) The fingerprint of an individual can be easily replicated through the prototyping
techniques as fingerprint gets recorded in certain devices when it comes to physical
contact with the fingerprint of the individuals. The software deployed for the purpose of
imitating the fingerprint of the individuals is the VeriFinger software.
c) The vulnerability of the voice recognition system lies in the fact that the voice can be
imitated through the recording activities and can be used for the purpose of forgery,
thereby gaining unauthorized access over the restricted property of the individuals.
Research Questions
This study was guided by the following research questions;
a) What are the biometric systems?
b) What are the benefits of implementing an unautomated biometric system in the
residential and commercial dwellings?
c) What are the behavioural and psychological traits which are used in the biometric
identification systems?
d) How does the automated biometric system work?
e) Which are the commonly used biometric systems in the current world and their benefits?
f) How can an automated biometric system be implemented in a residential and a
commercial dwelling?
Types of Biometric Technologies
Biometric referrers to an automated application of the behavioral or physiological
characteristics to establish or verify the identity of an individual. Many aspects of this definition
need a lot of elaboration. The biometric traits are divided into two broad categories. I.e.
a) Behavior
b) Physiological
6
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Behavioral or physiological attributes; biometric authentication depends on the
estimation of particular conduct and physiological qualities. Facial-check, finger - examine,
hand-filter, retina-sweep, and iris-check are considered as physiological biometrics, in light of
the direct estimation of a piece of the human body (Choi & Moon, 2017). Mark output and
voice-filter are considered as social biometrics; since they depend on, estimating and getting
information from and the activity performed by an individual and henceforth by implication
measure qualities of the human body. Time is critical to the social biometrics-the characteristic
being estimated is typically attached to an activity; for example, the marked or spoken
arrangement of words, which have a start and completion. The conduct or physiological
arrangement is a significant method for looking into the kind of biometric innovations that are
accessible. By and by, the physiological/conduct differentiation is n somewhat fake. The conduct
biometrics s is typically founded on or to a limited extent physiology, for example, the state of
the vocal ropes when the voice - examine is utilized or the skill of the fingers and turns in the
marking filter. The physiological biometric technologies have similarly informed the behavior of
the user, for instance, the way in which a user looks at the camera or the way he/she presents a
finger (Yang & Zheng, 2019).
There are numerous biometric systems and technologies to facilitate diverse kinds of
implementations. To select the correct biometric to be extremely effective for the particular state,
one has to map through several multifaceted vendor products as well as keep an eye on future
technology-based plus standards enhancements. Below is an outline of biometrics technology
and systems.
Hand geometry
Hand geometry entails assessing and analyzing plus determining the structure and shape
of the hand. It might be appropriate where there are more clients or where clients access the
system occasionally. Accurateness is able to be extremely high if preferred, as well as flexible
performance tuning plus arrangement are able to contain numerous applications. Corporations
are making use of hand geometry readers in diverse scenarios, comprising attendance and time
recording (Yang & Wang, 2018).
7
estimation of particular conduct and physiological qualities. Facial-check, finger - examine,
hand-filter, retina-sweep, and iris-check are considered as physiological biometrics, in light of
the direct estimation of a piece of the human body (Choi & Moon, 2017). Mark output and
voice-filter are considered as social biometrics; since they depend on, estimating and getting
information from and the activity performed by an individual and henceforth by implication
measure qualities of the human body. Time is critical to the social biometrics-the characteristic
being estimated is typically attached to an activity; for example, the marked or spoken
arrangement of words, which have a start and completion. The conduct or physiological
arrangement is a significant method for looking into the kind of biometric innovations that are
accessible. By and by, the physiological/conduct differentiation is n somewhat fake. The conduct
biometrics s is typically founded on or to a limited extent physiology, for example, the state of
the vocal ropes when the voice - examine is utilized or the skill of the fingers and turns in the
marking filter. The physiological biometric technologies have similarly informed the behavior of
the user, for instance, the way in which a user looks at the camera or the way he/she presents a
finger (Yang & Zheng, 2019).
There are numerous biometric systems and technologies to facilitate diverse kinds of
implementations. To select the correct biometric to be extremely effective for the particular state,
one has to map through several multifaceted vendor products as well as keep an eye on future
technology-based plus standards enhancements. Below is an outline of biometrics technology
and systems.
Hand geometry
Hand geometry entails assessing and analyzing plus determining the structure and shape
of the hand. It might be appropriate where there are more clients or where clients access the
system occasionally. Accurateness is able to be extremely high if preferred, as well as flexible
performance tuning plus arrangement are able to contain numerous applications. Corporations
are making use of hand geometry readers in diverse scenarios, comprising attendance and time
recording (Yang & Wang, 2018).
7

Figure 1: Hand geometry recognition
Voice control
A voice-based system that is used for the verification is foundational on voice-to-print
verification, where complex technology changes voice into text. Voice technology-based
biometrics necessitates a microphone, which is accessible by means of personal computers these
days Voice biometrics is to substitute the presently employed techniques, for example,
passwords, PINs or account names. However, the voice will be a matching method intended for
finger-scan systems, as numerous people notice finger scanning like a superior verification form.
Figu
re 2:
Voice Controlled Home Automation System
8
Voice control
A voice-based system that is used for the verification is foundational on voice-to-print
verification, where complex technology changes voice into text. Voice technology-based
biometrics necessitates a microphone, which is accessible by means of personal computers these
days Voice biometrics is to substitute the presently employed techniques, for example,
passwords, PINs or account names. However, the voice will be a matching method intended for
finger-scan systems, as numerous people notice finger scanning like a superior verification form.
Figu
re 2:
Voice Controlled Home Automation System
8

This type of biometrics allows you to be able to utilize the hands-free mode of the
devices and the system. This comes in handy when your hands are preoccupied, like driving or
even cooking. This is a good way of commanding the various electronics in the house. An
example of a device that supports this biometric is VoicePod created by HouseLogix. This is a
device that has inbuilt microphones as well as speakers that enable the owner to interact with the
various electronic devices by use of voice (Saggese & Hubenko, 2019). One can be able to tune
music, control light, radio, security, thermostats, television and also locks and camera. One can
even be able to request the weather or temperature measurements or be informed if someone is at
the door or breach of security.
Facial scan
Facial recognition is the system of identifying a human face through technology. The
system employs biometrics to identify facial features from a video or photo. Therefore, it
compares the information to the database of known faces and finds a match. This technology
helps verify personal identity. However, facial recognition has privacy and misidentification
issues. Following the increased applications of facial recognition in different information
technology areas such as mobile phone companies, social media, airports, entrances, and
restricted areas, etc., this study explores “how has information technology supported the
development of facial recognition and issues of facial recognition.” The study aims to identify
how information technology supports facial technology, the issues of facial recognition in
information technology, and recommend solutions for the issues (Singh & Prasad, 2018).
9
devices and the system. This comes in handy when your hands are preoccupied, like driving or
even cooking. This is a good way of commanding the various electronics in the house. An
example of a device that supports this biometric is VoicePod created by HouseLogix. This is a
device that has inbuilt microphones as well as speakers that enable the owner to interact with the
various electronic devices by use of voice (Saggese & Hubenko, 2019). One can be able to tune
music, control light, radio, security, thermostats, television and also locks and camera. One can
even be able to request the weather or temperature measurements or be informed if someone is at
the door or breach of security.
Facial scan
Facial recognition is the system of identifying a human face through technology. The
system employs biometrics to identify facial features from a video or photo. Therefore, it
compares the information to the database of known faces and finds a match. This technology
helps verify personal identity. However, facial recognition has privacy and misidentification
issues. Following the increased applications of facial recognition in different information
technology areas such as mobile phone companies, social media, airports, entrances, and
restricted areas, etc., this study explores “how has information technology supported the
development of facial recognition and issues of facial recognition.” The study aims to identify
how information technology supports facial technology, the issues of facial recognition in
information technology, and recommend solutions for the issues (Singh & Prasad, 2018).
9
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

Figure 3: Facial recognition
This is a biometric system that enables the homeowner to know the members of the
family that are at home. This is done through the inputting of facial scans of every family
member. This system can also alert you when a foreigner enters your house without permission.
An example of such a system is WELCOME by Netatmo. Facial recognition is currently at a
very mature point, whereby it is used in many, if not all, electronic communication or service
providing devices (Wilmer, 2017). Facial recognition is now used in all aspects and departments
in the world, including investigation system, job hiring process to judge job interviewees, In AI
emotion analysis, and in hospitals to differentiate patients. Facial recognition is, therefore, at its
very peak.
There are several challenges that have been addressed to achieve more complex facial
recognition technology. For instance, in the past, facial recognition mainly worked with stagnant
pictures since the recognition process was very slow. The technology was advanced to decrease
the time taken to identify a single image. The improvement was made such that currently, facial
recognition can work with pictures in motion, such as in live CCTV videos. This technology is
explained in such a way that it compares one image to a number of images in a motion video.
The one-to-many recognition works so fast and can analyze multiple pictures in a few seconds.
The improvement in Facial recognition, therefore, happened in two ways; the speed of
10
This is a biometric system that enables the homeowner to know the members of the
family that are at home. This is done through the inputting of facial scans of every family
member. This system can also alert you when a foreigner enters your house without permission.
An example of such a system is WELCOME by Netatmo. Facial recognition is currently at a
very mature point, whereby it is used in many, if not all, electronic communication or service
providing devices (Wilmer, 2017). Facial recognition is now used in all aspects and departments
in the world, including investigation system, job hiring process to judge job interviewees, In AI
emotion analysis, and in hospitals to differentiate patients. Facial recognition is, therefore, at its
very peak.
There are several challenges that have been addressed to achieve more complex facial
recognition technology. For instance, in the past, facial recognition mainly worked with stagnant
pictures since the recognition process was very slow. The technology was advanced to decrease
the time taken to identify a single image. The improvement was made such that currently, facial
recognition can work with pictures in motion, such as in live CCTV videos. This technology is
explained in such a way that it compares one image to a number of images in a motion video.
The one-to-many recognition works so fast and can analyze multiple pictures in a few seconds.
The improvement in Facial recognition, therefore, happened in two ways; the speed of
10

recognition was improved, and the technology advanced such that it can identify mages from
motion videos or live videos (Siregar & Syahputra, 2018).
Face recognition based system investigations facial features. It necessitates a digital
camera to build up a facial image of the client intended for verification. For the reason that facial
scanning requires additional peripheral things that are not incorporated in fundamental personal
computers, it is more of a position marketplace intended for network verification. Though, the
casino business has capitalized on this technology to produce a human’s facial database of scam
artists intended for rapid recognition through security staff (Gormley, 2019).
There are several marketplaces targeted by facial recognition technology. The technology
targets both individual consumers as well as industries. The targeted market place includes the
financial industry, healthcare industry, law enforcement, and sales industry. These industries use
facial recognition in identifying their customers. In addition to that, facial recognition technology
is used by individual consumers in instances such as door recognitions and safe boxes in specific
houses. In sales industries, facial recognition is used to identify specific products and in the
advertisement of the products. For instance, in Cooler Screens Inc. where facial recognition is
used to identify the customers by age and gender, as well as identify the external environmental
factors in the process of identifying a suitable drink for the specific customer at that particular
time. The sales department also uses facial descriptions by analyzing customer details and online
information in order to advertise to them based on their interests (Meena & Choudhary, 2019).
Facial recognition technology has been applied in many areas, especially where security
is needed. In this regard, companies such as Apple have been producing facial recognition
products. People can unlock phones and book flights and vehicles through facial recognition.
The first application of facial recognition in Apple was unlocking iPhone X and the technology
developed to unlocking iPhone XS through Face ID authentication- this technology help verify
the ownership of phone users. Facial recognition monitors the people entering and leaving
airports. In this case, the Department of Homeland Security can monitor the overstayed visa that
can be used in the criminal investigation (Pratap & Bhatia, 2015).
Airplanes and some vehicles use facial recognition to help their customers book flights
and travel conveniently. If a person has ever traveled by a certain plane or vehicle, he/she is
easily identified through facial recognition in the next flight or travel, hence easy booking. The
government has also adopted facial recognition technology whereby law enforcement agencies;
11
motion videos or live videos (Siregar & Syahputra, 2018).
Face recognition based system investigations facial features. It necessitates a digital
camera to build up a facial image of the client intended for verification. For the reason that facial
scanning requires additional peripheral things that are not incorporated in fundamental personal
computers, it is more of a position marketplace intended for network verification. Though, the
casino business has capitalized on this technology to produce a human’s facial database of scam
artists intended for rapid recognition through security staff (Gormley, 2019).
There are several marketplaces targeted by facial recognition technology. The technology
targets both individual consumers as well as industries. The targeted market place includes the
financial industry, healthcare industry, law enforcement, and sales industry. These industries use
facial recognition in identifying their customers. In addition to that, facial recognition technology
is used by individual consumers in instances such as door recognitions and safe boxes in specific
houses. In sales industries, facial recognition is used to identify specific products and in the
advertisement of the products. For instance, in Cooler Screens Inc. where facial recognition is
used to identify the customers by age and gender, as well as identify the external environmental
factors in the process of identifying a suitable drink for the specific customer at that particular
time. The sales department also uses facial descriptions by analyzing customer details and online
information in order to advertise to them based on their interests (Meena & Choudhary, 2019).
Facial recognition technology has been applied in many areas, especially where security
is needed. In this regard, companies such as Apple have been producing facial recognition
products. People can unlock phones and book flights and vehicles through facial recognition.
The first application of facial recognition in Apple was unlocking iPhone X and the technology
developed to unlocking iPhone XS through Face ID authentication- this technology help verify
the ownership of phone users. Facial recognition monitors the people entering and leaving
airports. In this case, the Department of Homeland Security can monitor the overstayed visa that
can be used in the criminal investigation (Pratap & Bhatia, 2015).
Airplanes and some vehicles use facial recognition to help their customers book flights
and travel conveniently. If a person has ever traveled by a certain plane or vehicle, he/she is
easily identified through facial recognition in the next flight or travel, hence easy booking. The
government has also adopted facial recognition technology whereby law enforcement agencies;
11

for example, the police are using facial recognition to carry out investigations and monitor
licenses, national IDs, and passports. According to Voth (2013), social media is using facial
recognition, especially Facebook, whereby an algorithm is used to detect a face when a user
uploads a photo to their platforms. Facebook can recognize a face with 98% accuracy.
Facial recognition is not always efficient, and it can raise privacy and security issues. The
technology has not been reliable in identifying fraud, especially in driving licenses and passports.
In this case, passport photo or driver’s license photo taken in different countries at particular
times, the face recognition is likely to fail if the federal government’s network does not connect
effectively. Facial recognition may not test the accuracy of the information, especially when
comparing data of different ethnic groups. In this regard, it raises the issues of misidentification
in criminal investigation, leading to injustice. The facial recognition used in social media is not
100% accurate. Therefore, it can facilitate cybercrime, such as hacking into personal information
(Andrejevic & Selwyn, 2019).
Facial recognition is used in many departments to verify and ensure security. The
technology involves the comparison of the biometric face with the identified faces in the
database, and it can be used in departments that need information security. Information
Technology companies such as Apple and Facebook are supporting the use of facial
identification by implementing advanced features. Facial recognition saves time in booking
flights and travel, and it promotes transport activities. Government enforcement agencies have
been using facial recognition to verify and identify people from different ethnic groups. For
example, Phillips & Chellappa (2018) argue that law enforcement has been using CCTV cameras
to identify criminals in airports and business premises. However, facial recognition has not been
efficient to law enforcement agencies when identifying people from different ethnic groups;
misidentification has become an issue. The efficiency of facial recognition in social media has
led to privacy issues whereby criminals are using the opportunity to hack into accounts and cause
cybercrimes and privacy issues. Generally, misidentification and privacy issues undermine the
effectiveness and efficiency of facial recognition.
Facial recognition accuracy depends on the quality of the face image. Therefore, the
quality of the image should be considered when uploading a face image on a facial recognition
system. Social media should improve the verification process of facial recognition. In this case, a
12
licenses, national IDs, and passports. According to Voth (2013), social media is using facial
recognition, especially Facebook, whereby an algorithm is used to detect a face when a user
uploads a photo to their platforms. Facebook can recognize a face with 98% accuracy.
Facial recognition is not always efficient, and it can raise privacy and security issues. The
technology has not been reliable in identifying fraud, especially in driving licenses and passports.
In this case, passport photo or driver’s license photo taken in different countries at particular
times, the face recognition is likely to fail if the federal government’s network does not connect
effectively. Facial recognition may not test the accuracy of the information, especially when
comparing data of different ethnic groups. In this regard, it raises the issues of misidentification
in criminal investigation, leading to injustice. The facial recognition used in social media is not
100% accurate. Therefore, it can facilitate cybercrime, such as hacking into personal information
(Andrejevic & Selwyn, 2019).
Facial recognition is used in many departments to verify and ensure security. The
technology involves the comparison of the biometric face with the identified faces in the
database, and it can be used in departments that need information security. Information
Technology companies such as Apple and Facebook are supporting the use of facial
identification by implementing advanced features. Facial recognition saves time in booking
flights and travel, and it promotes transport activities. Government enforcement agencies have
been using facial recognition to verify and identify people from different ethnic groups. For
example, Phillips & Chellappa (2018) argue that law enforcement has been using CCTV cameras
to identify criminals in airports and business premises. However, facial recognition has not been
efficient to law enforcement agencies when identifying people from different ethnic groups;
misidentification has become an issue. The efficiency of facial recognition in social media has
led to privacy issues whereby criminals are using the opportunity to hack into accounts and cause
cybercrimes and privacy issues. Generally, misidentification and privacy issues undermine the
effectiveness and efficiency of facial recognition.
Facial recognition accuracy depends on the quality of the face image. Therefore, the
quality of the image should be considered when uploading a face image on a facial recognition
system. Social media should improve the verification process of facial recognition. In this case, a
12
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

64-pixel image or more can be efficient in verifying the ownership of an account user, e.g.,
Facebook. The federal government should use multiple images during enrolment for reference in
case of misidentification –according to Jamwal & Farnworth (2018), this can help reduce the
injustice promote national security. Proper face posture should be considered when taking a
facial recognition image – this can help solve the issues of facial recognition in passports and
driving license photos. The government and business institutions should employ IT professionals
to manage facial recognition systems by ensuring the availability of a strong network to support
facial recognition processes. The information recommends technology companies to update and
implement advanced facial recognition systems to prevent the issues of cybercrime and privacy.
Facial recognition is important in ensuring information security. Different institutions are
using facial recognition for identity and security. Privacy and misidentification are the main
issues of facial technology. Despite the issues of facial recognition, the technology has been
successful in promoting national security through law enforcement. Therefore, the government,
social media, and business institutions should adopt the technology and implement measures to
solve the issues to verify identification and detect criminal activities efficiently (Chan & Cheng,
2018).
Fingerprint and Iris scanning
This is a smart home biometric system that uses a fingerprint or Iris scan to give access to
the users that have been enrolled in the order. Through the scan of a finger or palm print, as well
as an iris scan, can enable a homeowner to control the audio devices, lights, temperature and also
light the fireplace (Malathi & Jeberson, 2016). These devices are usually mounted on entrances
of buildings, houses, rooms, and even offices, thus making the use of secret words and PINS
obsolete. An example of such a system is the Control4 smart home system which supports touch
and micro scans like Iris.
Fingerprints appear at the patterns discovered on a fingertip. There are multiplicities of
methods to fingerprint authentication, for example, as customary police technique, by means of
pattern-matching systems or tools, plus things similar to more border patterns plus Ultra-Sonics.
This appears to be an extremely high-quality preference for in-house systems (Jeon & Lee,
2016). In the identification of fingerprints, various techniques are used, which include using
ultraviolet light, which identifies a fingerprint on surfaces in which fingerprints cannot be seen
13
Facebook. The federal government should use multiple images during enrolment for reference in
case of misidentification –according to Jamwal & Farnworth (2018), this can help reduce the
injustice promote national security. Proper face posture should be considered when taking a
facial recognition image – this can help solve the issues of facial recognition in passports and
driving license photos. The government and business institutions should employ IT professionals
to manage facial recognition systems by ensuring the availability of a strong network to support
facial recognition processes. The information recommends technology companies to update and
implement advanced facial recognition systems to prevent the issues of cybercrime and privacy.
Facial recognition is important in ensuring information security. Different institutions are
using facial recognition for identity and security. Privacy and misidentification are the main
issues of facial technology. Despite the issues of facial recognition, the technology has been
successful in promoting national security through law enforcement. Therefore, the government,
social media, and business institutions should adopt the technology and implement measures to
solve the issues to verify identification and detect criminal activities efficiently (Chan & Cheng,
2018).
Fingerprint and Iris scanning
This is a smart home biometric system that uses a fingerprint or Iris scan to give access to
the users that have been enrolled in the order. Through the scan of a finger or palm print, as well
as an iris scan, can enable a homeowner to control the audio devices, lights, temperature and also
light the fireplace (Malathi & Jeberson, 2016). These devices are usually mounted on entrances
of buildings, houses, rooms, and even offices, thus making the use of secret words and PINS
obsolete. An example of such a system is the Control4 smart home system which supports touch
and micro scans like Iris.
Fingerprints appear at the patterns discovered on a fingertip. There are multiplicities of
methods to fingerprint authentication, for example, as customary police technique, by means of
pattern-matching systems or tools, plus things similar to more border patterns plus Ultra-Sonics.
This appears to be an extremely high-quality preference for in-house systems (Jeon & Lee,
2016). In the identification of fingerprints, various techniques are used, which include using
ultraviolet light, which identifies a fingerprint on surfaces in which fingerprints cannot be seen
13

easily. Fingerprints can also be identified using photographs, which are also done by pressing an
individual finger onto an ink. Fingerprint can be developed through a visible technique known as
the ‘powder and brush’ technique where the surface is brushed with a powder that is very fine
and sticky to the droplets.
Figure 4: Fingerprint recognition
In situations where the surface may become some surfaces that may absorb the powder
and make the fingerprints undistinguishable, electrostatic is used. Here, very fine powder will be
placed on an electrode that is positively adjacent where it becomes charged; hence is attracted to
the specimen that is negatively charged. High voltage moves the particles to travel quickly and
stick firmly to the fingerprint. As this process continues, the fingerprint will be sufficiently
built-up. Casting is the best method of preserving plastic fingerprint. Here, a liquid material will
be poured on the fingerprint and also hardened in order to make an impression of cats. This
casting method is best since it can store fingerprint for a longer duration. Other fingerprints that
are visible can be preserved using photography (Jahan & Chowdhury, 2019).
Fingerprints are scanned into the automated fingerprint system where ridge details and
other identifying characteristics are digitized in such in detail that the system can find a match
among the millions of fingerprints that are available in the database. This new structure of
identification has helped governments in different ways. It is vastly used in civil identification
projects like registration for elections, driving license, welfare systems, et cetera. Through this
system, a government can make sure that no identity theft takes place, or one person is not using
two identities in order to vote (Muhtahir & Kayode, 2013). This kind of crime is quite common
14
individual finger onto an ink. Fingerprint can be developed through a visible technique known as
the ‘powder and brush’ technique where the surface is brushed with a powder that is very fine
and sticky to the droplets.
Figure 4: Fingerprint recognition
In situations where the surface may become some surfaces that may absorb the powder
and make the fingerprints undistinguishable, electrostatic is used. Here, very fine powder will be
placed on an electrode that is positively adjacent where it becomes charged; hence is attracted to
the specimen that is negatively charged. High voltage moves the particles to travel quickly and
stick firmly to the fingerprint. As this process continues, the fingerprint will be sufficiently
built-up. Casting is the best method of preserving plastic fingerprint. Here, a liquid material will
be poured on the fingerprint and also hardened in order to make an impression of cats. This
casting method is best since it can store fingerprint for a longer duration. Other fingerprints that
are visible can be preserved using photography (Jahan & Chowdhury, 2019).
Fingerprints are scanned into the automated fingerprint system where ridge details and
other identifying characteristics are digitized in such in detail that the system can find a match
among the millions of fingerprints that are available in the database. This new structure of
identification has helped governments in different ways. It is vastly used in civil identification
projects like registration for elections, driving license, welfare systems, et cetera. Through this
system, a government can make sure that no identity theft takes place, or one person is not using
two identities in order to vote (Muhtahir & Kayode, 2013). This kind of crime is quite common
14

all over the world. Sometimes a highly sensitive job requires the employer to check the
background of the candidate for the job so that all kinds of risks can be avoided. This type of
identification check is mostly done for high-level posts in the government or law enforcement
agencies.
Figure 5: Types of fingerprints
Present-day, fingerprints are an age-old method of identification and an accepted form of
evidence in criminal proceedings. The absolute nature of fingerprints is one reason for this. No
two people in the world have the same prints- not even those of identical twins. Because of this,
and the fact that fingerprints do not alter or change as one grows and ages, fingerprints provide
an infallible means of identifying a suspect. The physical composition of one's fingerprints is the
ridges on the fingers, hands, and feet. One's “ridges” can fall into any one of three classifications:
arches, loops, and whirls. Some people have more than one, all, or any combination of these
classifications. These distinct classifications provide scientists with a point of reference for
comparison. Fingerprints from a crime scene or evidence can be matched, or not, by identifying
identical points. While experts may vary, the most common range of acceptable points is
somewhere between 12 and 20 points of similarity (Utzhanova, 2016).
15
background of the candidate for the job so that all kinds of risks can be avoided. This type of
identification check is mostly done for high-level posts in the government or law enforcement
agencies.
Figure 5: Types of fingerprints
Present-day, fingerprints are an age-old method of identification and an accepted form of
evidence in criminal proceedings. The absolute nature of fingerprints is one reason for this. No
two people in the world have the same prints- not even those of identical twins. Because of this,
and the fact that fingerprints do not alter or change as one grows and ages, fingerprints provide
an infallible means of identifying a suspect. The physical composition of one's fingerprints is the
ridges on the fingers, hands, and feet. One's “ridges” can fall into any one of three classifications:
arches, loops, and whirls. Some people have more than one, all, or any combination of these
classifications. These distinct classifications provide scientists with a point of reference for
comparison. Fingerprints from a crime scene or evidence can be matched, or not, by identifying
identical points. While experts may vary, the most common range of acceptable points is
somewhere between 12 and 20 points of similarity (Utzhanova, 2016).
15
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

Potential benefits
The smart home system is fascinating in keeping level with the cutting edge of
technological advancement. It gives people pride and esteem but also offers many advantages to
the homeowners. Some of these advantages include:
Enhancement of security at home.
The safety of the house dramatically improves when one gets to integrate security as well
as surveillance components to the home automation system network. There are various security
measures that one can exploit like scrutiny cameras, programmed door locks, motion sensors,
fingerprint scans, iris scans, face recognition, and other safety precautions. This will enable the
homeowner to operate the system from even his bedroom (Lunerti & Michael, 2018). They can
also be able to request alerts as well as supervise your house activities concurrently in-house as
well as remotely.
Figure 6: Thumbprint door scanner
16
The smart home system is fascinating in keeping level with the cutting edge of
technological advancement. It gives people pride and esteem but also offers many advantages to
the homeowners. Some of these advantages include:
Enhancement of security at home.
The safety of the house dramatically improves when one gets to integrate security as well
as surveillance components to the home automation system network. There are various security
measures that one can exploit like scrutiny cameras, programmed door locks, motion sensors,
fingerprint scans, iris scans, face recognition, and other safety precautions. This will enable the
homeowner to operate the system from even his bedroom (Lunerti & Michael, 2018). They can
also be able to request alerts as well as supervise your house activities concurrently in-house as
well as remotely.
Figure 6: Thumbprint door scanner
16

Dynamic for the addition of extra components.
Home automation systems can integrate new machines and devices into the system. This
is because there is a constant innovation of new technologies and marvelous prototypes as time
progresses. Also, one can feel the necessity to upgrade the hardware and software to
accommodate new ones. The ability of the systems to incorporate newbies will significantly
assist the user in maintaining a modern technological way of life.
It has improved energy conservation.
Smart home systems enable the homeowner to be able to conserve the power in the home.
One can be able to regulate the consumption of energy through control of the regulation of the
various appliances. For instance, you can be able to check if the lights were left on, switching off
of audio equipment, set the optimum power setting that runs through the day. Furthermore, you
can be able to dim lights, thus conserve energy (Sarfraz, 2019).
Central management of all the home appliances and devices.
Smart home systems bring about the expediency of the whole system and home
management using a single interface. Thus, one can be able to operate the various devices and
functions of the system via voice control once they have gotten familiar with the operation of the
system. This makes the system usability to be an easy task.
Enhanced machine functionality.
Home automation systems assist one in optimizing the utility of appliances. A well-
programmed audio system will significantly come in handy in the management of music and
movie library an easy task when you have guests. An automated cooking oven can help to cook
your food to precise excellence. A smart television will significantly assist you in sourcing
proper channels and applications as well as enable you to navigate to your best programs. Having
your system connected with a programmed technology will enhance the proficiency of your
devices as well as appliances making your life easier (Negri & Falcão, 2019).
Direction on home management.
A smart home can able you to track the operation of your house. You can be able to
check on the frequency of content you watch, the variety of food you store, the amount of energy
you consume as well the types of meals that you prepare in your smart oven. With this
17
Home automation systems can integrate new machines and devices into the system. This
is because there is a constant innovation of new technologies and marvelous prototypes as time
progresses. Also, one can feel the necessity to upgrade the hardware and software to
accommodate new ones. The ability of the systems to incorporate newbies will significantly
assist the user in maintaining a modern technological way of life.
It has improved energy conservation.
Smart home systems enable the homeowner to be able to conserve the power in the home.
One can be able to regulate the consumption of energy through control of the regulation of the
various appliances. For instance, you can be able to check if the lights were left on, switching off
of audio equipment, set the optimum power setting that runs through the day. Furthermore, you
can be able to dim lights, thus conserve energy (Sarfraz, 2019).
Central management of all the home appliances and devices.
Smart home systems bring about the expediency of the whole system and home
management using a single interface. Thus, one can be able to operate the various devices and
functions of the system via voice control once they have gotten familiar with the operation of the
system. This makes the system usability to be an easy task.
Enhanced machine functionality.
Home automation systems assist one in optimizing the utility of appliances. A well-
programmed audio system will significantly come in handy in the management of music and
movie library an easy task when you have guests. An automated cooking oven can help to cook
your food to precise excellence. A smart television will significantly assist you in sourcing
proper channels and applications as well as enable you to navigate to your best programs. Having
your system connected with a programmed technology will enhance the proficiency of your
devices as well as appliances making your life easier (Negri & Falcão, 2019).
Direction on home management.
A smart home can able you to track the operation of your house. You can be able to
check on the frequency of content you watch, the variety of food you store, the amount of energy
you consume as well the types of meals that you prepare in your smart oven. With this
17

information, you can be able to evaluate your everyday habits as well as the modifications that
you can incorporate to achieve your wishes.
Smart Home Automation
Over the years, ’ home security systems have grown and evolved into newer and greater
systems. There are new technologies that have “taken this industry to unprecedented new
heights: totally revolutionizing the gadgets, systems, and devices that protect homeowners from
external threats” (Darby, 2018).
Having a security system makes the homeowner and the occupants feel safer and give
them peace of mind. A burglar will think twice about breaking into a home when they see a sign
in the yard saying the home is protected by a security system. It is worrying how someone can
hack into systems to get personal information or even being watched while using my laptop.
In the past, home security systems had to have someone from the security company,
come in and manually change the system when it needed updating or something needed to be
changed. These systems were not always reliable or effective, and all they did was make a loud
enough noise that would alert the neighborhood. Homeowners can now do it themselves by
having a smart-home security system installed either by a company or by themselves. These
systems have become easy to use and cost-effective to maintain (Chen & Zhang, 2018).
In the future, there will be bigger stress on cybersecurity to prevent hackers from
infiltrating unprotected smart devices like; lights, thermostats, smart speakers, and infant
monitoring systems. There will be more systems that require fingerprint, voice, and face
recognition to authenticate your identity. Soon systems will be able to detect a false alarm from a
real one. There will be more kid-friendly features that will make it harder for them to set off the
alarms or mess with the system settings. In the coming months, there is expected to be greater
integrations. “Gadgets will work better together to create a sophisticated and easily customized
smart-home environment that’s both safe and readily intuitive” (Domb, 2019)
18
you can incorporate to achieve your wishes.
Smart Home Automation
Over the years, ’ home security systems have grown and evolved into newer and greater
systems. There are new technologies that have “taken this industry to unprecedented new
heights: totally revolutionizing the gadgets, systems, and devices that protect homeowners from
external threats” (Darby, 2018).
Having a security system makes the homeowner and the occupants feel safer and give
them peace of mind. A burglar will think twice about breaking into a home when they see a sign
in the yard saying the home is protected by a security system. It is worrying how someone can
hack into systems to get personal information or even being watched while using my laptop.
In the past, home security systems had to have someone from the security company,
come in and manually change the system when it needed updating or something needed to be
changed. These systems were not always reliable or effective, and all they did was make a loud
enough noise that would alert the neighborhood. Homeowners can now do it themselves by
having a smart-home security system installed either by a company or by themselves. These
systems have become easy to use and cost-effective to maintain (Chen & Zhang, 2018).
In the future, there will be bigger stress on cybersecurity to prevent hackers from
infiltrating unprotected smart devices like; lights, thermostats, smart speakers, and infant
monitoring systems. There will be more systems that require fingerprint, voice, and face
recognition to authenticate your identity. Soon systems will be able to detect a false alarm from a
real one. There will be more kid-friendly features that will make it harder for them to set off the
alarms or mess with the system settings. In the coming months, there is expected to be greater
integrations. “Gadgets will work better together to create a sophisticated and easily customized
smart-home environment that’s both safe and readily intuitive” (Domb, 2019)
18
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Figure 7: Elements of a Smart Home
It is widely anticipated that the future networking of the home will experience numerous
devices connected to each other to the internet. With the introduction of many such new
sophisticated technologies as tablets and smartphones, the demand for connectivity in consumer
electronic devices is proliferating. However, these devices are, in total, are becoming part of our
homes. This sets in the need to use the same devices alongside the existing devices in homes. For
instance, one would wonder whether the smartphone (with its powerful functionality) in his hand
can increase or reduce the volume of the TV set in front of him or her. The rapid supercharge of
wireless communication, and information technology increases the possibility of embedding
smartness in homes (Yang & Lee, 2018).
Once configured, smart homes intelligently interact with inhibitors providing a safe and
comfortable living. These smart homes literally communicate with their inhibitors and respond to
their needs. On the other hand, the users can as well control certain aspects of their homes from
wherever. For instance, one could turn off lights from the comfort of an office’s chair. This is
achieved through the automation of the entire devices at home (Palaniyappan, 2019). An
automated smart home enables centralized appliances, lighting, security locks of doors and gates,
and automated control of heating, ventilation, and air conditioning (HVAC).
19
It is widely anticipated that the future networking of the home will experience numerous
devices connected to each other to the internet. With the introduction of many such new
sophisticated technologies as tablets and smartphones, the demand for connectivity in consumer
electronic devices is proliferating. However, these devices are, in total, are becoming part of our
homes. This sets in the need to use the same devices alongside the existing devices in homes. For
instance, one would wonder whether the smartphone (with its powerful functionality) in his hand
can increase or reduce the volume of the TV set in front of him or her. The rapid supercharge of
wireless communication, and information technology increases the possibility of embedding
smartness in homes (Yang & Lee, 2018).
Once configured, smart homes intelligently interact with inhibitors providing a safe and
comfortable living. These smart homes literally communicate with their inhibitors and respond to
their needs. On the other hand, the users can as well control certain aspects of their homes from
wherever. For instance, one could turn off lights from the comfort of an office’s chair. This is
achieved through the automation of the entire devices at home (Palaniyappan, 2019). An
automated smart home enables centralized appliances, lighting, security locks of doors and gates,
and automated control of heating, ventilation, and air conditioning (HVAC).
19

Automation of the smart homes is enabled by technologies both wired and wireless even
though the use of wireless is much easy, efficient, and hence preferred. This paper thus explores
the wireless technologies that are expected to be integrated into future smart homes. It also
outlines how these technologies can be integrated into a future home of a family of two parents,
two teenagers, one dog, and one cat.
The functionality of automated devices in smart homes depends on communication
through wireless networks and sensors. Developing computing technologies must communicate
with each other. Wireless networks, which include Bluetooth, WI-Fi, RFID (Radio Frequency
Identification), and cellular technologies, among others, enable this (Suseelan & Palaniappan,
2015). All devices and technologies in the smart home employ a combination of these
technologies for their functioning. Without these wireless technologies, the devices however
sophisticated, cannot communicate with each other. For instance, a TV set gives us an option to
watch different channels. Its control depends on another device, the remote control. In this case,
the remote control can only successfully control the TV set if they can communicate. This
communication, for instance, is enabled by wireless technology, infrared in this case. Similarly,
all devices dependent upon each other must communicate using these technologies (Amri &
Setiawan, 2018).
Transforming and integrating your biometrics capability
Through the integration of Biometrics and Bio-information can considerably enhance the
general correctness of the biometric detection system. Integrated biometric systems are able to
decrease the FTE/FTC rates as well as offer more opposition besides spoofing for the reason that
it is hard to, at the same time spoof numerous biometric detections and checking sources.
Integrated systems are able to offer as well the potential to investigate a huge database in a well-
organized as well as fast style. This is able to be attained through by means of a comparatively
straightforward however less precise modality to prune the database previous to employing the
more composite and precise modality on the continuing data to carry out the ultimate recognition
job (Park & Song, 2017).
Though integrated biometric systems as well have a number of issues. They are more
costly as well as necessitate more resources intended for computation plus storage as compared
to uni-modal biometric technology-based systems. Integrated technology-based systems
20
though the use of wireless is much easy, efficient, and hence preferred. This paper thus explores
the wireless technologies that are expected to be integrated into future smart homes. It also
outlines how these technologies can be integrated into a future home of a family of two parents,
two teenagers, one dog, and one cat.
The functionality of automated devices in smart homes depends on communication
through wireless networks and sensors. Developing computing technologies must communicate
with each other. Wireless networks, which include Bluetooth, WI-Fi, RFID (Radio Frequency
Identification), and cellular technologies, among others, enable this (Suseelan & Palaniappan,
2015). All devices and technologies in the smart home employ a combination of these
technologies for their functioning. Without these wireless technologies, the devices however
sophisticated, cannot communicate with each other. For instance, a TV set gives us an option to
watch different channels. Its control depends on another device, the remote control. In this case,
the remote control can only successfully control the TV set if they can communicate. This
communication, for instance, is enabled by wireless technology, infrared in this case. Similarly,
all devices dependent upon each other must communicate using these technologies (Amri &
Setiawan, 2018).
Transforming and integrating your biometrics capability
Through the integration of Biometrics and Bio-information can considerably enhance the
general correctness of the biometric detection system. Integrated biometric systems are able to
decrease the FTE/FTC rates as well as offer more opposition besides spoofing for the reason that
it is hard to, at the same time spoof numerous biometric detections and checking sources.
Integrated systems are able to offer as well the potential to investigate a huge database in a well-
organized as well as fast style. This is able to be attained through by means of a comparatively
straightforward however less precise modality to prune the database previous to employing the
more composite and precise modality on the continuing data to carry out the ultimate recognition
job (Park & Song, 2017).
Though integrated biometric systems as well have a number of issues. They are more
costly as well as necessitate more resources intended for computation plus storage as compared
to uni-modal biometric technology-based systems. Integrated technology-based systems
20

normally necessitate more time intended for authentication and enrollment, reasoning several
problems to the client. Ultimately, the system accurateness is able to, in fact, degrade contrast to
the uni-modal system if a suitable method is not taken intended for uniting the confirmation
offered through the diverse modalities. Though the benefits of integrated technology-based
systems far balance the limits plus, therefore, similar arrangements are being more and more
applied in security-based significant implementations (Kloppenburg & Ploeg, 2018).
New technology-based biometrics systems are transforming the simplicity of use,
exactness as well as the performance of customary biometrics technology-based solutions. It is
offering more dependable identity authentication in criminal justice and healthcare plus
facilitating in a lot of efficient ways regarding well-organized immigration plus cross-border
travel. It is incorporating one more layer to police as well as defense security procedures. This
technology is also facilitating to fight against the more and more intelligent illegal movements in
regions, for example, economical services (Prasad & Aithal, 2018). New integrated biometrics
technology is now working and operational in flowing major areas of corporations:
a) Biometrics technology in business logic is able to define the workflow arrangement of
biometric solutions we require, making sure our implementations are employed as
successfully as possible.
b) Compliance: In this scenario, this technology is able to make sure that we have technical
potentials to broadcast information in line by means of international and national
technology necessities intended for transmitting as well as receiving data.
c) National, plus international policies: Offering workflow as well as data captures
recommendation on utilizing, capture as well as storage of biometric data and
information as of regulations leading human rights, confidentiality, data safety, etc.
d) Architecture: Biometrics technology offers support and leadership on the architectural
design of our technology solutions (Singh & Manaf, 2018).
e) Integration: Biometrics technology and related integrating biometrics solutions by means
of our obtainable internal or 3rd party solutions plus handling huge verity of interfaces by
means of other organizations.
f) Operations: Biometrics technology offers support for maintenance as well as support
large plus difficult biometrics support.
21
problems to the client. Ultimately, the system accurateness is able to, in fact, degrade contrast to
the uni-modal system if a suitable method is not taken intended for uniting the confirmation
offered through the diverse modalities. Though the benefits of integrated technology-based
systems far balance the limits plus, therefore, similar arrangements are being more and more
applied in security-based significant implementations (Kloppenburg & Ploeg, 2018).
New technology-based biometrics systems are transforming the simplicity of use,
exactness as well as the performance of customary biometrics technology-based solutions. It is
offering more dependable identity authentication in criminal justice and healthcare plus
facilitating in a lot of efficient ways regarding well-organized immigration plus cross-border
travel. It is incorporating one more layer to police as well as defense security procedures. This
technology is also facilitating to fight against the more and more intelligent illegal movements in
regions, for example, economical services (Prasad & Aithal, 2018). New integrated biometrics
technology is now working and operational in flowing major areas of corporations:
a) Biometrics technology in business logic is able to define the workflow arrangement of
biometric solutions we require, making sure our implementations are employed as
successfully as possible.
b) Compliance: In this scenario, this technology is able to make sure that we have technical
potentials to broadcast information in line by means of international and national
technology necessities intended for transmitting as well as receiving data.
c) National, plus international policies: Offering workflow as well as data captures
recommendation on utilizing, capture as well as storage of biometric data and
information as of regulations leading human rights, confidentiality, data safety, etc.
d) Architecture: Biometrics technology offers support and leadership on the architectural
design of our technology solutions (Singh & Manaf, 2018).
e) Integration: Biometrics technology and related integrating biometrics solutions by means
of our obtainable internal or 3rd party solutions plus handling huge verity of interfaces by
means of other organizations.
f) Operations: Biometrics technology offers support for maintenance as well as support
large plus difficult biometrics support.
21
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

Systems integration expertise
Biometrics technology offers power as a worldwide systems integrator is a serious aspect
in supporting to bring biometrics policies to life. Biometrics technology offers a deep
understanding of the difficult associations, interfaces as well as safety controls that facilitate our
clients to handle the real-time stream of biometric information countrywide as well as across
borders. For instance, as crime turns out to be more and more worldwide, we are able to put
together by obtainable technology to offer very fast identification and utilize of the iris, face as
well as other biometrics technology-based data registered inside different databases, comprising
those managing criminal records as well as prisoner details (Dargan & Kumar, 2020). Other
instances comprise:
a) EURODAC: it is a biometrics technology-based project. It is used or the border controls;
those are relaxed all through Europe, the job of policing prohibited movement has
developed in tandem. In this scenario, biometrics technology offered support to ease this
pressure. Through biometrics technology, there is the implementation of the EURODAC
(European fingerprint database intended for identifying asylum seekers and irregular
cross border travelers) biometry system on a European scale intended for the European
Commission. It practices immigration system needs plus permits associate nations to
ensure if refuge has previously been sought in another associate country. A particular
registration gets a small amount of time is required for lengthy examinations each time
asylum is sought (Zhou & Xiao, 2018).
b) Norway: There is a Biometra project intended for the Norwegian Police that offers a
fundamental communications server by means that numerous internal, as well as outside
applications, interface to provide numerous thousands of clients the ability to download
as well as utilize biometrics technology.
c) Biometrics technology-based project of European Union Visa Information System
(VIS): biometrics technology is primary the group is offering the Schengen Visa
European Database is comprising biometrics data, details, information that is used for
supporting member states to contribute Schengen visas as well as the fight against visa
fraud. By means of the support of Biometrics technology VIS, border guards are capable
of confirming whether the person presenting a visa is its legal holder of it.
22
Biometrics technology offers power as a worldwide systems integrator is a serious aspect
in supporting to bring biometrics policies to life. Biometrics technology offers a deep
understanding of the difficult associations, interfaces as well as safety controls that facilitate our
clients to handle the real-time stream of biometric information countrywide as well as across
borders. For instance, as crime turns out to be more and more worldwide, we are able to put
together by obtainable technology to offer very fast identification and utilize of the iris, face as
well as other biometrics technology-based data registered inside different databases, comprising
those managing criminal records as well as prisoner details (Dargan & Kumar, 2020). Other
instances comprise:
a) EURODAC: it is a biometrics technology-based project. It is used or the border controls;
those are relaxed all through Europe, the job of policing prohibited movement has
developed in tandem. In this scenario, biometrics technology offered support to ease this
pressure. Through biometrics technology, there is the implementation of the EURODAC
(European fingerprint database intended for identifying asylum seekers and irregular
cross border travelers) biometry system on a European scale intended for the European
Commission. It practices immigration system needs plus permits associate nations to
ensure if refuge has previously been sought in another associate country. A particular
registration gets a small amount of time is required for lengthy examinations each time
asylum is sought (Zhou & Xiao, 2018).
b) Norway: There is a Biometra project intended for the Norwegian Police that offers a
fundamental communications server by means that numerous internal, as well as outside
applications, interface to provide numerous thousands of clients the ability to download
as well as utilize biometrics technology.
c) Biometrics technology-based project of European Union Visa Information System
(VIS): biometrics technology is primary the group is offering the Schengen Visa
European Database is comprising biometrics data, details, information that is used for
supporting member states to contribute Schengen visas as well as the fight against visa
fraud. By means of the support of Biometrics technology VIS, border guards are capable
of confirming whether the person presenting a visa is its legal holder of it.
22

d) Belgium: Biometrics technology incorporation expertise was known as through the
Belgian Police intended for whom technology development industry incorporated an
AFIS solution by means of their obtainable systems.
Issues in Integrating Biometrics
Privacy concerns have always been the emerging issues in the smart home's systems as a
result of exposure to the remote gadgets in the systems. White hat hackers should evaluate these
systems to check for privacy and security flaws and, therefore should not be charged with crime
doing as long as their actions are benefiting the community. Additionally, in the process of
encouraging independence, the system may end up in increases the separation of individuals
from the outside world, resulting in solitude (Morosan, 2018).
Though the applicability of new technology of the biometric systems plus procedures to
huge scale issues has been extensively assessed for previous few years, the real service of
biometrics has been normally restricted to small-scale trial systems, and the small numbers of
large scale efforts have been fewer than overpoweringly flourishing(Bigun & Reynolds, 2014).
However yet, the discussion of a huge-scale biometric system persists in developing,
immediately as the biometric business itself.
Apart from fundamental problems of cost-per-checkpoint as well as Type-1/Type-2
performance, numerous difficult and consistent issues are concerned in the variety and
flourishing accomplishment of biometrics systems. Though these “Integration Problems” are
able to be recapitulated in an extremely small number of constituents of concerns, the problems
themselves are able to simply be evaluated plus tackled by means of respect to the explicit,
comprehensive needs of a specific application (Morosan, 2012).
Biometric Integration Issues come up since, normally, there is no totally “off-the-shelf”
explanation that a biometric potential will suit the entire areas of a particular system. The
procedure of integrating the biometric into a complete systems solution necessitates the
accomplishment of interfaces plus applications systems, as well as the incorporation of together
custom as well as commercial mechanisms into an exclusive application, that is custom
customized to convince the entire of the operational, functional and technical needs of the system
(Ross, Banerjee, & Swearingen, 2019). When a biometric technology-based system has been
23
Belgian Police intended for whom technology development industry incorporated an
AFIS solution by means of their obtainable systems.
Issues in Integrating Biometrics
Privacy concerns have always been the emerging issues in the smart home's systems as a
result of exposure to the remote gadgets in the systems. White hat hackers should evaluate these
systems to check for privacy and security flaws and, therefore should not be charged with crime
doing as long as their actions are benefiting the community. Additionally, in the process of
encouraging independence, the system may end up in increases the separation of individuals
from the outside world, resulting in solitude (Morosan, 2018).
Though the applicability of new technology of the biometric systems plus procedures to
huge scale issues has been extensively assessed for previous few years, the real service of
biometrics has been normally restricted to small-scale trial systems, and the small numbers of
large scale efforts have been fewer than overpoweringly flourishing(Bigun & Reynolds, 2014).
However yet, the discussion of a huge-scale biometric system persists in developing,
immediately as the biometric business itself.
Apart from fundamental problems of cost-per-checkpoint as well as Type-1/Type-2
performance, numerous difficult and consistent issues are concerned in the variety and
flourishing accomplishment of biometrics systems. Though these “Integration Problems” are
able to be recapitulated in an extremely small number of constituents of concerns, the problems
themselves are able to simply be evaluated plus tackled by means of respect to the explicit,
comprehensive needs of a specific application (Morosan, 2012).
Biometric Integration Issues come up since, normally, there is no totally “off-the-shelf”
explanation that a biometric potential will suit the entire areas of a particular system. The
procedure of integrating the biometric into a complete systems solution necessitates the
accomplishment of interfaces plus applications systems, as well as the incorporation of together
custom as well as commercial mechanisms into an exclusive application, that is custom
customized to convince the entire of the operational, functional and technical needs of the system
(Ross, Banerjee, & Swearingen, 2019). When a biometric technology-based system has been
23

chosen for a specific application, a systematic evaluation of the biometric-based technology
system and products have to be formulated as explained in the previous sections, by means of
respect to the comprehensive necessities of the system. This procedure will recognize the needs
intended for custom system and structure development and incorporation. The integration of
biometric technology issues, then, is an evaluation of how to carry out the development plus
incorporation of custom abilities as well as to put together the application through the
arrangement of the obtainable system (Ross et al., 2019).
Integrated Biometric Technology Development
This section will present a deep and detailed analysis of some of the major areas and
aspects of the integrated biometric system development. Below are some of the major areas and
aspects of such system development major development structures.
Device Capabilities
a) API
b) Computer System Interfacing Capabilities
c) Built-in Applications
Development Issues
Below is an outline of some of the major issues and aspects regarding the development of the
integration of biometric technology:
a) Development of biometric technology systems and Tools
b) Source Code accessibility of the biometric technology
c) Technical OEM/Integrator-Level Documentation
Support Issues
Below is an outline of some of the major issues and aspects regarding support of the integration
of biometric technology:
a) Manufacturer Technical Support for biometric technology development and application
b) Manufacturer Maintenance Support for biometric technology development and
application
24
system and products have to be formulated as explained in the previous sections, by means of
respect to the comprehensive necessities of the system. This procedure will recognize the needs
intended for custom system and structure development and incorporation. The integration of
biometric technology issues, then, is an evaluation of how to carry out the development plus
incorporation of custom abilities as well as to put together the application through the
arrangement of the obtainable system (Ross et al., 2019).
Integrated Biometric Technology Development
This section will present a deep and detailed analysis of some of the major areas and
aspects of the integrated biometric system development. Below are some of the major areas and
aspects of such system development major development structures.
Device Capabilities
a) API
b) Computer System Interfacing Capabilities
c) Built-in Applications
Development Issues
Below is an outline of some of the major issues and aspects regarding the development of the
integration of biometric technology:
a) Development of biometric technology systems and Tools
b) Source Code accessibility of the biometric technology
c) Technical OEM/Integrator-Level Documentation
Support Issues
Below is an outline of some of the major issues and aspects regarding support of the integration
of biometric technology:
a) Manufacturer Technical Support for biometric technology development and application
b) Manufacturer Maintenance Support for biometric technology development and
application
24
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

c) Third-Party Support for biometric technology development and application
Cost issues in Biometrics
Just like in all other information technology investments, there has to be a cost-benefit
analysis and assessment. As such, there would be a need for the development of a business case
that would identify organizational needs. This should aid in the formulation of system goals that
should address the expected outcomes of the system, including binding biometric features to an
appropriate identity or identifying undesirable individuals in the watch list. Performance
parameters should also be specified. This process enables the estimation of the expected cost,
both the initial and recurring. Initial costs include designing, developing and testing,
implementing the system, personnel training, the cost of hardware and software; improvement of
network infrastructure; and enrollment cost. On the other hand, recurring costs include software
and hardware maintenance, program management costs, token card issuance, and personnel
training. Against these costs, the benefits that accrue would be weighed (Hashiyada, 2011)
Despite the fact that allegations of computer power dropping, the cost of acquiring
biometric devices remains high. Darby (2018) notes the persistent substantial cost of acquiring
biometric systems and their recurring costs. The authors of the 9/11 Commission
recommendations give an example of the budget for US-VISIT during the 2004 financial year
that cost $328 million. Incorporating biometric technology into visas costs between $700 million
and $ 1.5 billion annually as of 2002 depending on the type of technology and number of
applicants. The same would cost between $ 1.6 and 2.4 billion annually if implemented on US
passports. These costs are less fielding and planning costs. Research by Ross et al. (2019) also
indicates the unavailability of biometrics systems with the cost of maintenance being too high.
The hardware costs in the technology used in biometric technology could be several US dollars
per match per second, according to Darby (2018). There also arises the practical challenge of
record keeping. More so, operational costs for not only biometrics systems but all the other
biometric systems have proved to be high. For instance, errors made during latent fingerprint
identification have also seen governments incur not only monetary cost but also a cost on image
and inability to identify respective criminals. Still, so much of the budget goes into research and
development, not only to acquire more effective biometric technologies but also to significantly
reduce the associated costs.
25
Cost issues in Biometrics
Just like in all other information technology investments, there has to be a cost-benefit
analysis and assessment. As such, there would be a need for the development of a business case
that would identify organizational needs. This should aid in the formulation of system goals that
should address the expected outcomes of the system, including binding biometric features to an
appropriate identity or identifying undesirable individuals in the watch list. Performance
parameters should also be specified. This process enables the estimation of the expected cost,
both the initial and recurring. Initial costs include designing, developing and testing,
implementing the system, personnel training, the cost of hardware and software; improvement of
network infrastructure; and enrollment cost. On the other hand, recurring costs include software
and hardware maintenance, program management costs, token card issuance, and personnel
training. Against these costs, the benefits that accrue would be weighed (Hashiyada, 2011)
Despite the fact that allegations of computer power dropping, the cost of acquiring
biometric devices remains high. Darby (2018) notes the persistent substantial cost of acquiring
biometric systems and their recurring costs. The authors of the 9/11 Commission
recommendations give an example of the budget for US-VISIT during the 2004 financial year
that cost $328 million. Incorporating biometric technology into visas costs between $700 million
and $ 1.5 billion annually as of 2002 depending on the type of technology and number of
applicants. The same would cost between $ 1.6 and 2.4 billion annually if implemented on US
passports. These costs are less fielding and planning costs. Research by Ross et al. (2019) also
indicates the unavailability of biometrics systems with the cost of maintenance being too high.
The hardware costs in the technology used in biometric technology could be several US dollars
per match per second, according to Darby (2018). There also arises the practical challenge of
record keeping. More so, operational costs for not only biometrics systems but all the other
biometric systems have proved to be high. For instance, errors made during latent fingerprint
identification have also seen governments incur not only monetary cost but also a cost on image
and inability to identify respective criminals. Still, so much of the budget goes into research and
development, not only to acquire more effective biometric technologies but also to significantly
reduce the associated costs.
25

Researchers in information technology and criminology have devised different
technologies that would be important in reducing the cost of biometric technologies. Darby
(2018) proposed the replacement of the biometrics dedicated sensors with general-purpose
cameras found in cellular phones and laptops, among other devices. Unfortunately, images
generated by such devices do not meet the quality of the dedicated fingerprint sensors. As such,
there would need to process the images obtained from these devices to make them as much as
possible similar to those obtained from fingerprint dedicated sensors. Even with this innovation
still under test, fingerprint biometric remains the least costly method of biometrics identity and
verification as compared to more sophisticated technologies such as iris biometrics systems.
Security concerns
Before investing their confidence in the home automation system, clients are supposed to
be provided with a guarantee that their systems cannot be hacked, and unauthorized individuals
gain possession of data or even break into their houses. Due to the raging increase in the
acquisition of smart home systems with a camera, voice recognition, scanning devices, and other
devices, hackers can also be able to compromise the system and record users in their private
homes (Pagnin & Mitrokotsa, 2017). Furthermore, those users that have been given orders that
have a default or general passwords have become a source of external attacks that are easily
denied by the companies as faulty system service. Therefore, installing formidable security
precautions such as encrypted connection in the smart home systems will help the developers to
create reliable systems that can avert denial of service, extortion, prying, and other vices (Kaur &
Khanna, 2020).
Legal and ethical issues
Regarding legitimate concerns of the system, people are exposed to giving out their
information and data about themselves, which is collected and stored in the systems. There
confidential information of the owner amassed by the various devices can be accessed by other
technological systems, thus making the data to be vulnerable to the world. The companies that
collect and manage these confidential data have to protect it from unauthorized access. This has
been clearly stated in the Human Rights Act of 1998, article eight that gives people privacy
26
technologies that would be important in reducing the cost of biometric technologies. Darby
(2018) proposed the replacement of the biometrics dedicated sensors with general-purpose
cameras found in cellular phones and laptops, among other devices. Unfortunately, images
generated by such devices do not meet the quality of the dedicated fingerprint sensors. As such,
there would need to process the images obtained from these devices to make them as much as
possible similar to those obtained from fingerprint dedicated sensors. Even with this innovation
still under test, fingerprint biometric remains the least costly method of biometrics identity and
verification as compared to more sophisticated technologies such as iris biometrics systems.
Security concerns
Before investing their confidence in the home automation system, clients are supposed to
be provided with a guarantee that their systems cannot be hacked, and unauthorized individuals
gain possession of data or even break into their houses. Due to the raging increase in the
acquisition of smart home systems with a camera, voice recognition, scanning devices, and other
devices, hackers can also be able to compromise the system and record users in their private
homes (Pagnin & Mitrokotsa, 2017). Furthermore, those users that have been given orders that
have a default or general passwords have become a source of external attacks that are easily
denied by the companies as faulty system service. Therefore, installing formidable security
precautions such as encrypted connection in the smart home systems will help the developers to
create reliable systems that can avert denial of service, extortion, prying, and other vices (Kaur &
Khanna, 2020).
Legal and ethical issues
Regarding legitimate concerns of the system, people are exposed to giving out their
information and data about themselves, which is collected and stored in the systems. There
confidential information of the owner amassed by the various devices can be accessed by other
technological systems, thus making the data to be vulnerable to the world. The companies that
collect and manage these confidential data have to protect it from unauthorized access. This has
been clearly stated in the Human Rights Act of 1998, article eight that gives people privacy
26

regarding their life, home, family life and also communication. The data can only be accessed
through permission from the court towards an investigation (Baichoo & Purmah, 2018).
Concerning ethical concerns, there are two perspectives, Kantianism and
consequentialism. Kantianism is a theory that supports the demonstration rather than its effects,
while consequentialism is contingent on realizing the good-evil of a demonstration through its
impact or results. An example is when a hacker cracks into a system to obtain data about
particular software; the action is not right even if the hacker did not cause any issues in the order.
Thus, it is considered okay that home automation systems be advantageous to the customers, also
if it contains security concerns (Baichoo & Purmah, 2018).
Proposed Method and Future Work
We can improve the results of the fingerprint methods that have been discussed in this
research paper by doing the following:
a) Enhancing the fingerprint image by completing the ridges
b) The methods of fingerprint discussed should be able to consider the average gauge
thickness
c) Also, a more robust algorithm 4minute imagine should be developed
d) It would also be a great improvement if the methods identified and discussed above can
be able to remove false many time and noise
e) This research paper has concluded that fingerprinting methods cannot be able to attain a
100% accuracy level. In regard, the integration of fingerprint methods into other
biometric technologies would increase the accuracy and enhance the results of using
these fingerprint methods.
In spite of some few cases of inaccurate information, today, fingerprint biometric
technology has become a critical solution in tackling security challenges in government agencies
and private corporations. But even before implementation, well-informed decisions should be
made on the technology to use, and detailed cost-benefit analysis and assessment conducted so as
to ensure that the gains from such systems outweigh the incurred costs.
Those who remain skeptical about biometrics technology for reasons like performance,
accuracy, and reliability should combine these security systems with other available security
27
through permission from the court towards an investigation (Baichoo & Purmah, 2018).
Concerning ethical concerns, there are two perspectives, Kantianism and
consequentialism. Kantianism is a theory that supports the demonstration rather than its effects,
while consequentialism is contingent on realizing the good-evil of a demonstration through its
impact or results. An example is when a hacker cracks into a system to obtain data about
particular software; the action is not right even if the hacker did not cause any issues in the order.
Thus, it is considered okay that home automation systems be advantageous to the customers, also
if it contains security concerns (Baichoo & Purmah, 2018).
Proposed Method and Future Work
We can improve the results of the fingerprint methods that have been discussed in this
research paper by doing the following:
a) Enhancing the fingerprint image by completing the ridges
b) The methods of fingerprint discussed should be able to consider the average gauge
thickness
c) Also, a more robust algorithm 4minute imagine should be developed
d) It would also be a great improvement if the methods identified and discussed above can
be able to remove false many time and noise
e) This research paper has concluded that fingerprinting methods cannot be able to attain a
100% accuracy level. In regard, the integration of fingerprint methods into other
biometric technologies would increase the accuracy and enhance the results of using
these fingerprint methods.
In spite of some few cases of inaccurate information, today, fingerprint biometric
technology has become a critical solution in tackling security challenges in government agencies
and private corporations. But even before implementation, well-informed decisions should be
made on the technology to use, and detailed cost-benefit analysis and assessment conducted so as
to ensure that the gains from such systems outweigh the incurred costs.
Those who remain skeptical about biometrics technology for reasons like performance,
accuracy, and reliability should combine these security systems with other available security
27
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

measures such as smart cards. Fingerprint biometric technology would not solely provide
accurate information needed. Otherwise, innovation in this field is expected to continue, and
humans would always seek to come up with better foolproof techniques and tools in fingerprint
biometrics.
Conclusions
As technology continues to advance, so does that digital platform gains popularity among
the public, people are resorting to the installation of home automation systems. This interest in
the clients has paved the way to enhance and comprehensive technological systems to be
developed. People are yearning to experience the lifestyle of automation systems, and therefore a
lot of homes will be operated electronically without even the touch of a computer or a keyboard.
Though biometrics technology is turning out to be an essential fraction of the identity
management systems, present biometric technology-based systems do not have 100 percent
accuracy. A number of the aspects that influence the precision of biometric systems comprise
non-universality, noisy input, non-distinctiveness, and lack of invariant illustration. Additionally,
biometric technology-based systems are as well vulnerable to security-based attacks. A biometric
technology-based system that incorporates numerous cues is able to beat several of these
boundaries and attain improved performance. Widespread research work has been performed to
recognize enhanced techniques to unite the information attained from numerous sources. It is
hard to carry out information incorporation at the beginning phases of processing (feature and
sensor levels). In several situations, a combination of the sensor as well as feature levels, cannot
even be probable. Biometric technology Integration at the decision level is too naive because of
the partial information content accessible at this level. Consequently, researchers have normally
desired incorporation at the matching score level that presents the most excellent compromise
flanked by information content as well as simplicity in integration.
One of the major issues in the score level integration of bio-metric is that the identical
scores generated through diverse biometric matches are not for all time analogous. These scores
are able to have diverse qualities as well as several normalization methods is essential to
formulate the arrangement of scores significant. One more limitation of the present integration of
biometric methods is their failure to manage soft biometric data and information, particularly
when the soft information is not extremely accurate. Despite the drawbacks in using fingerprint
28
accurate information needed. Otherwise, innovation in this field is expected to continue, and
humans would always seek to come up with better foolproof techniques and tools in fingerprint
biometrics.
Conclusions
As technology continues to advance, so does that digital platform gains popularity among
the public, people are resorting to the installation of home automation systems. This interest in
the clients has paved the way to enhance and comprehensive technological systems to be
developed. People are yearning to experience the lifestyle of automation systems, and therefore a
lot of homes will be operated electronically without even the touch of a computer or a keyboard.
Though biometrics technology is turning out to be an essential fraction of the identity
management systems, present biometric technology-based systems do not have 100 percent
accuracy. A number of the aspects that influence the precision of biometric systems comprise
non-universality, noisy input, non-distinctiveness, and lack of invariant illustration. Additionally,
biometric technology-based systems are as well vulnerable to security-based attacks. A biometric
technology-based system that incorporates numerous cues is able to beat several of these
boundaries and attain improved performance. Widespread research work has been performed to
recognize enhanced techniques to unite the information attained from numerous sources. It is
hard to carry out information incorporation at the beginning phases of processing (feature and
sensor levels). In several situations, a combination of the sensor as well as feature levels, cannot
even be probable. Biometric technology Integration at the decision level is too naive because of
the partial information content accessible at this level. Consequently, researchers have normally
desired incorporation at the matching score level that presents the most excellent compromise
flanked by information content as well as simplicity in integration.
One of the major issues in the score level integration of bio-metric is that the identical
scores generated through diverse biometric matches are not for all time analogous. These scores
are able to have diverse qualities as well as several normalization methods is essential to
formulate the arrangement of scores significant. One more limitation of the present integration of
biometric methods is their failure to manage soft biometric data and information, particularly
when the soft information is not extremely accurate. Despite the drawbacks in using fingerprint
28

biometrics for identification and verification, including its high cost of acquisition and
maintenance, its use keeps rising because of innovative applications in place that seek to
maintain high degrees of accuracy.
29
maintenance, its use keeps rising because of innovative applications in place that seek to
maintain high degrees of accuracy.
29

References
Amri, Y., & Setiawan, M. A. (2018). Improving Smart Home Concept with the Internet of
Things Concept Using RaspberryPi and NodeMCU. IOP Conference Series: Materials Science
and Engineering, 325, 012021. https://doi.org/10.1088/1757-899X/325/1/012021
Andrejevic, M., & Selwyn, N. (2019). Facial recognition technology in schools: Critical
questions and concerns. Learning, Media and Technology, 0(0), 1–14.
https://doi.org/10.1080/17439884.2020.1686014
Baichoo, S., & Purmah, N. R. (2018). Legal and ethical considerations of biometric identity card:
Case for Mauritius. Computer Law & Security Review, 34(6), 1333–1341.
https://doi.org/10.1016/j.clsr.2018.08.010
Bigun, J., & Reynolds, D. (2014). Authentication gets personal with biometrics. IEEE Signal
Processing Magazine, 21(2), 50–62. https://doi.org/10.1109/MSP.2004.1276113
Chan, H.-L., & Cheng, C.-Y. (2018). Challenges and Future Perspectives on
Electroencephalogram-Based Biometrics in Person Recognition. Frontiers in Neuroinformatics,
12. https://doi.org/10.3389/fninf.2018.00066
Chen, W., & Zhang, Y. (2018). Smart Home: Architecture, Technologies, and Systems.
Procedia Computer Science, 131, 393–400. https://doi.org/10.1016/j.procs.2018.04.219
Choi, Y., & Moon, J. (2017). Security enhanced multi-factor biometric authentication scheme
using bio-hash function. PLoS ONE, 12(5). https://doi.org/10.1371/journal.pone.0176250
Darby, S. J. (2018). Smart technology in the home: Time for more clarity. Building Research &
Information, 46(1), 140–147. https://doi.org/10.1080/09613218.2017.1301707
Dargan, S., & Kumar, M. (2020). A comprehensive survey on the biometric recognition systems
based on physiological and behavioral modalities. Expert Systems with Applications, 143,
113114. https://doi.org/10.1016/j.eswa.2019.113114
30
Amri, Y., & Setiawan, M. A. (2018). Improving Smart Home Concept with the Internet of
Things Concept Using RaspberryPi and NodeMCU. IOP Conference Series: Materials Science
and Engineering, 325, 012021. https://doi.org/10.1088/1757-899X/325/1/012021
Andrejevic, M., & Selwyn, N. (2019). Facial recognition technology in schools: Critical
questions and concerns. Learning, Media and Technology, 0(0), 1–14.
https://doi.org/10.1080/17439884.2020.1686014
Baichoo, S., & Purmah, N. R. (2018). Legal and ethical considerations of biometric identity card:
Case for Mauritius. Computer Law & Security Review, 34(6), 1333–1341.
https://doi.org/10.1016/j.clsr.2018.08.010
Bigun, J., & Reynolds, D. (2014). Authentication gets personal with biometrics. IEEE Signal
Processing Magazine, 21(2), 50–62. https://doi.org/10.1109/MSP.2004.1276113
Chan, H.-L., & Cheng, C.-Y. (2018). Challenges and Future Perspectives on
Electroencephalogram-Based Biometrics in Person Recognition. Frontiers in Neuroinformatics,
12. https://doi.org/10.3389/fninf.2018.00066
Chen, W., & Zhang, Y. (2018). Smart Home: Architecture, Technologies, and Systems.
Procedia Computer Science, 131, 393–400. https://doi.org/10.1016/j.procs.2018.04.219
Choi, Y., & Moon, J. (2017). Security enhanced multi-factor biometric authentication scheme
using bio-hash function. PLoS ONE, 12(5). https://doi.org/10.1371/journal.pone.0176250
Darby, S. J. (2018). Smart technology in the home: Time for more clarity. Building Research &
Information, 46(1), 140–147. https://doi.org/10.1080/09613218.2017.1301707
Dargan, S., & Kumar, M. (2020). A comprehensive survey on the biometric recognition systems
based on physiological and behavioral modalities. Expert Systems with Applications, 143,
113114. https://doi.org/10.1016/j.eswa.2019.113114
30
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Dharavath, K., & Talukdar, F. A. (2013). Study on biometric authentication systems, challenges
and future trends: A review. 2013 IEEE International Conference on Computational Intelligence
and Computing Research, 1–7. https://doi.org/10.1109/ICCIC.2013.6724278
Domb, M. (2019). Smart Home Systems Based on Internet of Things. In IoT and Smart Home
Automation [Working Title]. https://doi.org/10.5772/intechopen.84894
Gormley, B. (2019, February 7). Hospitals Turn to Biometrics to Identify Patients. Wall Street
Journal. Retrieved from https://www.wsj.com/articles/hospitals-turn-to-biometrics-to-identify-
patients-11549508640
Hashiyada, M. (2011). DNA biometrics. In J. Yang (Ed.), Biometrics.
https://doi.org/10.5772/18139
Jahan, S., & Chowdhury, M. (2019). Robust user authentication model for securing electronic
healthcare system using fingerprint biometrics. International Journal of Computers and
Applications, 41(3), 233–242. https://doi.org/10.1080/1206212X.2018.1437651
Jamwal, R., & Farnworth, L. (2018). Evaluating the Use of Smart Home Technology by People
With Brain Impairment: Protocol for a Single-Case Experimental Design. JMIR Research
Protocols, 7(11). https://doi.org/10.2196/10451
Jeon, S.-Y., & Lee, M.-K. (2016). Security Analysis and Improvement of Fingerprint
Authentication for Smartphones [Research Article]. https://doi.org/10.1155/2016/8973828
Kaur, H., & Khanna, P. (2020). Privacy preserving remote multi-server biometric authentication
using cancelable biometrics and secret sharing. Future Generation Computer Systems, 102, 30–
41. https://doi.org/10.1016/j.future.2019.07.023
Kloppenburg, S., & Ploeg, I. van der. (2018). Securing Identities: Biometric Technologies and
the Enactment of Human Bodily Differences. Science as Culture, 0(0), 1–20.
https://doi.org/10.1080/09505431.2018.1519534
Lunerti, C., & Michael, R. (2018). Biometrics: Accessibility challenge or opportunity? PLOS
ONE, 13(3), e0194111. https://doi.org/10.1371/journal.pone.0194111
31
and future trends: A review. 2013 IEEE International Conference on Computational Intelligence
and Computing Research, 1–7. https://doi.org/10.1109/ICCIC.2013.6724278
Domb, M. (2019). Smart Home Systems Based on Internet of Things. In IoT and Smart Home
Automation [Working Title]. https://doi.org/10.5772/intechopen.84894
Gormley, B. (2019, February 7). Hospitals Turn to Biometrics to Identify Patients. Wall Street
Journal. Retrieved from https://www.wsj.com/articles/hospitals-turn-to-biometrics-to-identify-
patients-11549508640
Hashiyada, M. (2011). DNA biometrics. In J. Yang (Ed.), Biometrics.
https://doi.org/10.5772/18139
Jahan, S., & Chowdhury, M. (2019). Robust user authentication model for securing electronic
healthcare system using fingerprint biometrics. International Journal of Computers and
Applications, 41(3), 233–242. https://doi.org/10.1080/1206212X.2018.1437651
Jamwal, R., & Farnworth, L. (2018). Evaluating the Use of Smart Home Technology by People
With Brain Impairment: Protocol for a Single-Case Experimental Design. JMIR Research
Protocols, 7(11). https://doi.org/10.2196/10451
Jeon, S.-Y., & Lee, M.-K. (2016). Security Analysis and Improvement of Fingerprint
Authentication for Smartphones [Research Article]. https://doi.org/10.1155/2016/8973828
Kaur, H., & Khanna, P. (2020). Privacy preserving remote multi-server biometric authentication
using cancelable biometrics and secret sharing. Future Generation Computer Systems, 102, 30–
41. https://doi.org/10.1016/j.future.2019.07.023
Kloppenburg, S., & Ploeg, I. van der. (2018). Securing Identities: Biometric Technologies and
the Enactment of Human Bodily Differences. Science as Culture, 0(0), 1–20.
https://doi.org/10.1080/09505431.2018.1519534
Lunerti, C., & Michael, R. (2018). Biometrics: Accessibility challenge or opportunity? PLOS
ONE, 13(3), e0194111. https://doi.org/10.1371/journal.pone.0194111
31

Malathi, R., & Jeberson, R. (2016). An Integrated Approach of Physical Biometric
Authentication System. Procedia Computer Science, 85, 820–826.
https://doi.org/10.1016/j.procs.2016.05.271
Meena, G., & Choudhary, S. (2019). Biometric authentication in internet of things: A conceptual
view. Journal of Statistics and Management Systems, 22(4), 643–652.
https://doi.org/10.1080/09720510.2019.1609722
Morosan, C. (2012). Biometric solutions for today’s travel security problems. Journal of
Hospitality and Tourism Technology, 3(3), 176–195.
https://doi.org/10.1108/17579881211264477
Morosan, C. (2018). Information Disclosure to Biometric E-gates: The Roles of Perceived
Security, Benefits, and Emotions. Journal of Travel Research, 57(5), 644–657.
https://doi.org/10.1177/0047287517711256
Muhtahir, O., & Kayode, A. (2013). Fingerprint Biometric Authentication for Enhancing Staff
Attendance System. International Journal of Applied Information Systems, 5(3), 19–24.
https://doi.org/10.5120/ijais12-450867
Negri, N. A. R., & Falcão, V. A. (2019). Acceptance of biometric technology in airport check-in.
Journal of Air Transport Management, 81, 101720.
https://doi.org/10.1016/j.jairtraman.2019.101720
Pagnin, E., & Mitrokotsa, A. (2017). Privacy-Preserving Biometric Authentication: Challenges
and Directions [Review Article]. https://doi.org/10.1155/2017/7129505
Palaniyappan, T. K. (2019). IOT Based Energy Efficient Home Automation System (SSRN
Scholarly Paper No. ID 3400221). Retrieved from Social Science Research Network website:
https://papers.ssrn.com/abstract=3400221
Park, Y., & Song, H. (2017). Security analysis and enhancements of an improved multi-factor
biometric authentication scheme. International Journal of Distributed Sensor Networks, 13(8),
1550147717724308. https://doi.org/10.1177/1550147717724308
32
Authentication System. Procedia Computer Science, 85, 820–826.
https://doi.org/10.1016/j.procs.2016.05.271
Meena, G., & Choudhary, S. (2019). Biometric authentication in internet of things: A conceptual
view. Journal of Statistics and Management Systems, 22(4), 643–652.
https://doi.org/10.1080/09720510.2019.1609722
Morosan, C. (2012). Biometric solutions for today’s travel security problems. Journal of
Hospitality and Tourism Technology, 3(3), 176–195.
https://doi.org/10.1108/17579881211264477
Morosan, C. (2018). Information Disclosure to Biometric E-gates: The Roles of Perceived
Security, Benefits, and Emotions. Journal of Travel Research, 57(5), 644–657.
https://doi.org/10.1177/0047287517711256
Muhtahir, O., & Kayode, A. (2013). Fingerprint Biometric Authentication for Enhancing Staff
Attendance System. International Journal of Applied Information Systems, 5(3), 19–24.
https://doi.org/10.5120/ijais12-450867
Negri, N. A. R., & Falcão, V. A. (2019). Acceptance of biometric technology in airport check-in.
Journal of Air Transport Management, 81, 101720.
https://doi.org/10.1016/j.jairtraman.2019.101720
Pagnin, E., & Mitrokotsa, A. (2017). Privacy-Preserving Biometric Authentication: Challenges
and Directions [Review Article]. https://doi.org/10.1155/2017/7129505
Palaniyappan, T. K. (2019). IOT Based Energy Efficient Home Automation System (SSRN
Scholarly Paper No. ID 3400221). Retrieved from Social Science Research Network website:
https://papers.ssrn.com/abstract=3400221
Park, Y., & Song, H. (2017). Security analysis and enhancements of an improved multi-factor
biometric authentication scheme. International Journal of Distributed Sensor Networks, 13(8),
1550147717724308. https://doi.org/10.1177/1550147717724308
32

Phillips, P. J., & Chellappa, R. (2018). Face recognition accuracy of forensic examiners,
superrecognizers, and face recognition algorithms. Proceedings of the National Academy of
Sciences, 115(24), 6171–6176. https://doi.org/10.1073/pnas.1721355115
Prasad, K., & Aithal, P. S. (2018). A Study on Multifactor Authentication Model Using
Fingerprint Hash Code, Password and OTP (SSRN Scholarly Paper No. ID 3097480). Retrieved
from Social Science Research Network website: https://papers.ssrn.com/abstract=3097480
Pratap, N., & Bhatia, K. (2015). Future of Face Recognition: A Review. Procedia Computer
Science, 58, 578–585. https://doi.org/10.1016/j.procs.2015.08.076
Ross, A., Banerjee, S., & Swearingen, T. (2019). Some Research Problems in Biometrics: The
Future Beckons.
Saggese, S., & Hubenko, A. (2019). Biometric recognition of newborns and infants by non-
contact fingerprinting: Lessons learned. Gates Open Research, 3, 1477.
https://doi.org/10.12688/gatesopenres.12914.2
Sarfraz, N. (2019). Adermatoglyphia: Barriers to Biometric Identification and the Need for a
Standardized Alternative. Cureus, 11(2). https://doi.org/10.7759/cureus.4040
Singh, M. M., & Manaf, A. A. (2018). A novel out-of-band biometrics authentication scheme for
wearable devices. International Journal of Computers and Applications, 0(0), 1–13.
https://doi.org/10.1080/1206212X.2018.1547347
Singh, S., & Prasad, S. V. A. V. (2018). Techniques and Challenges of Face Recognition: A
Critical Review. Procedia Computer Science, 143, 536–543.
https://doi.org/10.1016/j.procs.2018.10.427
Siregar, S. T. M., & Syahputra, M. F. (2018). Human face recognition using eigenface in cloud
computing environment. IOP Conference Series: Materials Science and Engineering, 308,
012013. https://doi.org/10.1088/1757-899X/308/1/012013
Suseelan, A., & Palaniappan, S. (2015). Home Automation Systems—A Study. International
Journal of Computer Applications, 116, 11–18. https://doi.org/10.5120/20379-2601
33
superrecognizers, and face recognition algorithms. Proceedings of the National Academy of
Sciences, 115(24), 6171–6176. https://doi.org/10.1073/pnas.1721355115
Prasad, K., & Aithal, P. S. (2018). A Study on Multifactor Authentication Model Using
Fingerprint Hash Code, Password and OTP (SSRN Scholarly Paper No. ID 3097480). Retrieved
from Social Science Research Network website: https://papers.ssrn.com/abstract=3097480
Pratap, N., & Bhatia, K. (2015). Future of Face Recognition: A Review. Procedia Computer
Science, 58, 578–585. https://doi.org/10.1016/j.procs.2015.08.076
Ross, A., Banerjee, S., & Swearingen, T. (2019). Some Research Problems in Biometrics: The
Future Beckons.
Saggese, S., & Hubenko, A. (2019). Biometric recognition of newborns and infants by non-
contact fingerprinting: Lessons learned. Gates Open Research, 3, 1477.
https://doi.org/10.12688/gatesopenres.12914.2
Sarfraz, N. (2019). Adermatoglyphia: Barriers to Biometric Identification and the Need for a
Standardized Alternative. Cureus, 11(2). https://doi.org/10.7759/cureus.4040
Singh, M. M., & Manaf, A. A. (2018). A novel out-of-band biometrics authentication scheme for
wearable devices. International Journal of Computers and Applications, 0(0), 1–13.
https://doi.org/10.1080/1206212X.2018.1547347
Singh, S., & Prasad, S. V. A. V. (2018). Techniques and Challenges of Face Recognition: A
Critical Review. Procedia Computer Science, 143, 536–543.
https://doi.org/10.1016/j.procs.2018.10.427
Siregar, S. T. M., & Syahputra, M. F. (2018). Human face recognition using eigenface in cloud
computing environment. IOP Conference Series: Materials Science and Engineering, 308,
012013. https://doi.org/10.1088/1757-899X/308/1/012013
Suseelan, A., & Palaniappan, S. (2015). Home Automation Systems—A Study. International
Journal of Computer Applications, 116, 11–18. https://doi.org/10.5120/20379-2601
33
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

Utzhanova, A. (2016). Fingerprint Technology and Sustainable Development. European Journal
of Sustainable Development, 5(4), 325–325. https://doi.org/10.14207/ejsd.2016.v5n4p325
Voth, D. (2013). Face recognition technology. IEEE Intelligent Systems, 18(3), 4–7.
https://doi.org/10.1109/MIS.2003.1200719
Wilmer, J. B. (2017). Individual Differences in Face Recognition: A Decade of Discovery.
Current Directions in Psychological Science, 26(3), 225–230.
https://doi.org/10.1177/0963721417710693
Yang, H., & Lee, H. (2018). IoT Smart Home Adoption: The Importance of Proper Level
Automation [Research Article]. https://doi.org/10.1155/2018/6464036
Yang, W., & Wang, S. (2018). Biometrics Based Privacy-Preserving Authentication and Mobile
Template Protection [Research Article]. https://doi.org/10.1155/2018/7107295
Yang, W., & Zheng, G. (2019). Security and Accuracy of Fingerprint-Based Biometrics: A
Review. Symmetry, 11(2), 141. https://doi.org/10.3390/sym11020141
Zhou, S., & Xiao, S. (2018). 3D face recognition: A survey. Human-Centric Computing and
Information Sciences, 8(1), 35. https://doi.org/10.1186/s13673-018-0157-2
34
of Sustainable Development, 5(4), 325–325. https://doi.org/10.14207/ejsd.2016.v5n4p325
Voth, D. (2013). Face recognition technology. IEEE Intelligent Systems, 18(3), 4–7.
https://doi.org/10.1109/MIS.2003.1200719
Wilmer, J. B. (2017). Individual Differences in Face Recognition: A Decade of Discovery.
Current Directions in Psychological Science, 26(3), 225–230.
https://doi.org/10.1177/0963721417710693
Yang, H., & Lee, H. (2018). IoT Smart Home Adoption: The Importance of Proper Level
Automation [Research Article]. https://doi.org/10.1155/2018/6464036
Yang, W., & Wang, S. (2018). Biometrics Based Privacy-Preserving Authentication and Mobile
Template Protection [Research Article]. https://doi.org/10.1155/2018/7107295
Yang, W., & Zheng, G. (2019). Security and Accuracy of Fingerprint-Based Biometrics: A
Review. Symmetry, 11(2), 141. https://doi.org/10.3390/sym11020141
Zhou, S., & Xiao, S. (2018). 3D face recognition: A survey. Human-Centric Computing and
Information Sciences, 8(1), 35. https://doi.org/10.1186/s13673-018-0157-2
34
1 out of 35
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.