Simulation of Fingerprint as a Means of Security

Filed in Articles by on June 29, 2022

Simulation of Fingerprint as a Means of Security.

ABSTRACT

This project work is based on the simulation of fingerprints based biometrics, is an application that allows the computer to be able to identify and confirm an employee in an organisation and to change from the old manual system of identification to the new system.

Visual Basic 6.0 was used for developing the system because it is flexible and memory conserving. And to itself documentation, it is easy to understand and to overcome difficult tasks when compared with other languages.

Microsoft Access 2002 is used for the database development and preferred query language is Structured Query Language (SQL) for record manipulation.

TABLE OF CONTENTS

Title page

Certification

Dedication

Acknowledgement

Abstract

Table of contents

CHAPTER ONE: GENERAL INTRODUCTION

  • Introduction
  • Statement of the problem
  • Aim and objectives of the study
  • Significance of the study
  • Scope and limitation of the study
  • Definition of terms
  • Organisation of the report

CHAPTER TWO: REVIEW OF RELEVANT LITERATURES

  • Background knowledge
  • Computer Aided Learning/Instruction
    • Computer Aided Individual Learning
    • Computer Aided group Learning
  • Types of Computer Aided Learning Program
  • Benefits of computer aided learning
  • Limitation of Computer as a teaching aid
  • Artificial intelligence
  • Problems of artificial intelligence

CHAPTER THREE: PROJECT METHODOLOGY

  • Method of data collection
  • Analysis of data and the existing system
  • Problems of the existing system
  • Description of the proposed system
  • Advantages of the proposed system
  • Design and Implementation Methodology

CHAPTER FOUR: DESIGN, IMPLEMENTATION AND DOCUMENTATION OF THE SYSTEM

  • Design of the system
    • Output Design
    • Input Design
    • File/Database design
    • Procedure Design
  • Implementation of the System
    • Hardware Support
    • Software support
  • Documentation of the system
    • Program Documentation
    • Operating the system
    • Maintaining the system

CHAPTER FIVE: SUMMARY, CONCLUSION AND RECOMMENDATION

  • Summary
  • Conclusion
  • Recommendation

References

INTRODUCTION

When we interact with others we are used to identifying them by their physical appearance their voice or other sensory data.

When we need proof of identity beyond physical appearance we obtain a signature or we look at a photo identification card.

In cyberspace, where people need to interact with digital systems or with one another remotely, we do not have these tried and true means of identification available.

In almost all cases we cannot see, hear or obtain a signature from the person with whom we are interacting. Biometrics, the measurement of unique physical characteristics, is an ideal solution to the problem of identification.

Biometrics makes it possible to identify ourselves to digital systems and through these systems identify ourselves to others in cyberspace.

REFERENCES

Azeez Y. K. (2001): Personnel Management Ilorin, Olad Publisher. Ilorin
Brain D. D. (1985): Basic Linear Programming, Edwa08): Microsoft Encarta 2008. © 1993-2007 Microsoft Corporation. All rights reserved. Contributed by; Anil Jainrd Arnold Publications, Australia limited. Australia.
Claberts D. A. (2002):  Computer Management for busyness. Sprowell Publishers. New York.
Castellano M., Dimauro G., Impedovo S., Pirlo G. “Online Signature Verification”. Bandra, Mumbai-50

Comments are closed.

Hey Hi

Don't miss this opportunity

Enter Your Details