This study seeks to explain the full fingerprint recognition system for a sweeping mode Microsystem sensor in finer details. It will try to identify different types of mobile Microsystem sensors for full fingerprint recognition and their different areas they are used in security providers. The research will further explain the originality of the concept of the mobile Microsystem sensors and why they were considered for their applications in fingerprint identification techniques.
It will also discuss the modes of operations as well as physical features for various types of Microsystem sensor specifically the mobile genre. The study will also endeavour to analyse the manufacturing processes of the sweeping mode Microsystem sensor, where the interest focus will be the technological needs and cost requirement for their manufacturer. The research will also try to identify, analyse as well as evaluate different areas of application of sweeping mode Microsystem sensor particularly in the provision of security against falsification and loss.
Finally the study will try to highlight the effectiveness and efficiency of the sweeping mode Microsystem sensor for full fingerprint and determine its reliability in the fight against falsifications and loss.
Fingerprint recognition as a way of personal identification has been used for a long time. This s due to the fact that fingerprints are normally unique paramount marks/patterns. Every individual fingerprint marks are completely different from another all over the world even where there is a very high heritability in physical traits. Initially, fingerprint recognition technique involved the use of paper and ink. However, owing to current technological advances, solid-state sensors have come to play. The solid-state sensors apply different parameters to acquire the image. These parameters include physical quantities such as temperature, pressure as well as electrical field.
The solid-state sensors require static (matrix sensor) or mobile finger position also known as sweeping mode sensors. The image is processed using algorithms that are implemented according to sensors characteristics such as pressure, measurement and one line-sweeping mode.
Aims and Objectives
The main objectives of the research is to study the Full fingerprint recognition system and in particular how a sweeping mode Microsystem sensor can be used to acquire image by use of parameters such as pressure, temperature and electrical field. Further the study aims to study the wireless networks and existing security solutions as well as various Cirticom’s products.
This study also aims to explain the procedures for developing technical framework that can evaluate the risks as well as designing a model for Full fingerprint Microsystem sensor. The study also aims at establishing guidelines for business to follow when assessing the risks especially security risks. Finally, the study aims at identifying the requirements of security solutions as well as potential and existing risks.
Current Full Fingerprint recognition system whereby the sweeping mode Microsystem sensor to be used to identify image may not be able to identify image if for instance the person who is falsifying may have used gloves, plastic or other material to conceal the patterns in fingerprint identification. It is therefore limited to a case where the falsifying person used bare hands. There needs to be a more enhanced Microsystem sensor, which can be able to acquire the fingerprint, marks even if the falsifying person uses gloves to effect the loss.
The research design will be as follows. Firstly, the research will begin by studying the wireless network and existing security solutions. This will be followed by studying the Cirticom’s products. After the above task then an interview will be conducted on professionals especially those who are concerned with Microsystem sensors for full fingerprint. After the above activities then it will follow the evaluation of the variety of hand held devices and domain where the Microsystems sensors were used.
This will be followed by identifying and examining the potential and existing security risks as well as determining and developing technical framework that evaluate the risks. After the above tasks, then identification of the requirements of security solutions are not to be compromised. This will be followed closely by creating design models after which rigorous testing of design will follow. After testing the designs, critical evaluation of the procedures used will take place, which will be followed by providing guidelines for business to follow in assessing the risks. Finally, there will be a compilation of final report and its presentation.
Identifying the requirements of security solutions that are not to be compromised
The participants will establish the security needs that are most critical
Creating the design model
The participants will design a model which further can be developed to prototypes
Rigorous testing of the models
The participants will undertake the testing of the models so designed
Evaluation of critical procedure
The participants will evaluate the methods used in design of the models
Providing guidelines for business to follow assessing risks
The participants will provide guidelines to help for future risks assessment
The participants will write a Final Report of their findings.
Study of wireless network and existing security solution
The participants are expected to understand the wireless network circuits and security systems already in play
Study the Cirticom’s products
The participants will study the various Cirticom’s products and evaluate the areas of improvement
Interviewing the professionals
The participants will conduct interview to ascertain the view of professionals in the field of security
Establishing the variety of hand-held devices and domains
The participants will acknowledge the variety of hand-held devices and domains
Determining the potential and existing security risks
The participants will evaluate both potential and existing security risks
Developing technical framework that evaluates risks
The participants will develop a technical framework that can evaluate the security risks.
The participants will acknowledge the wireless network, existing security solutions, hand-held devices and domains. They will also understand potential and existing security risks. Additionally, the participants will understand the method of designing a Microsystem sensor for a Full Fingerprint.
Finally, the dissertation will result to a final report showing all the findings of the research work.
The following resources are required to conduct the programme. First participants are needed. We also need wireless networks, cameras, sweeping mode Microsystem sensor, laboratory, cables, transistors, adaptors, resistors, diodes, materials and tools for conducting the interview and computers. Further, we need resource materials for reading.