CFP last date
20 January 2025
Call for Paper
February Edition
IJCA solicits high quality original research papers for the upcoming February edition of the journal. The last date of research paper submission is 20 January 2025

Submit your paper
Know more
Reseach Article

Implementation of Automated Door Unlocking and Security System

Published on December 2015 by Madhusudhan M., Shankaraiah
National Conference on Power Systems and Industrial Automation
Foundation of Computer Science USA
NCPSIA2015 - Number 1
December 2015
Authors: Madhusudhan M., Shankaraiah
687ee14f-d6a8-4e72-8095-2bb3e7fa0845

Madhusudhan M., Shankaraiah . Implementation of Automated Door Unlocking and Security System. National Conference on Power Systems and Industrial Automation. NCPSIA2015, 1 (December 2015), 5-8.

@article{
author = { Madhusudhan M., Shankaraiah },
title = { Implementation of Automated Door Unlocking and Security System },
journal = { National Conference on Power Systems and Industrial Automation },
issue_date = { December 2015 },
volume = { NCPSIA2015 },
number = { 1 },
month = { December },
year = { 2015 },
issn = 0975-8887,
pages = { 5-8 },
numpages = 4,
url = { /proceedings/ncpsia2015/number1/23324-7211/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 National Conference on Power Systems and Industrial Automation
%A Madhusudhan M.
%A Shankaraiah
%T Implementation of Automated Door Unlocking and Security System
%J National Conference on Power Systems and Industrial Automation
%@ 0975-8887
%V NCPSIA2015
%N 1
%P 5-8
%D 2015
%I International Journal of Computer Applications
Abstract

By hearing the word 'CAR' creates a picture of luxury cars in the mind. Of course, riding a car is a dream for very one but securing the car is most important thing. This paper based on security system of car, by the use of multimodal biometric system in order to identify and to verify a person. The person who likes to ride the car has to go for following verifications. At the first, fingerprint sensor and the second voicerecognizer There are two possibilities: if the person is identified as the car owner or a known user, then he/she can take control over the car; if it's an intruder, the car will announce the security service by sending a text message to owner using a GPRS/GSM system. Car owner can also access the security system by sending text message.

References
  1. K. Jain, A. Ross, and S. Prabhakar, "An introduction to biometric recognition," IEEE Trans. On Circuits and Systems for Video Technology, vol. 14, pp. 4–20, Jan 2004.
  2. M. Golfarelli, D. Maio, and D. Maltoni, "On the error-reject tradeoff in biometric verification systems,", IEEE Trans. on Patt. Ana and Mach. Intell. , vol. 19, pp. 786–796, July 1997.
  3. Ross and A. K. Jain, "Information fusion in biometrics," Pattern Recognition Letters, vol. 24, pp. 2115–2125, Sep 2003.
  4. Ross and A. K. Jain, „Multimodal biometrics: an overview", Proc. of 12th European Signal Processing Conference (EUSIPCO), (Vienna, Austria), pp. 1221-1224, September 2004
  5. Imran Khan, „Multimodal Biometrics -- Is Two Better Than One?
  6. Minh N. Do, "An Automatic Speaker Recognition System"Lawrence R. Rabiner, "A Tutorial on Hidden MarkovModels and Selected Applications in Speech Recognition" Proceedings of the IEEE, 77 (2), p. 257–286, (1989-02-09)
  7. "Peer Reviewed Glossary of the Scientific Working Group on Friction Ridge Analysis, Study and Technology (SWGFAST)" Retrieved 2012-09-
  8. Ashbaugh, David R. "Ridgeology" Royal Canadian Mounted Police. Retrieved 2013-10-26.
  9. "International Association for Identification History, retrieved August 2006". Theiai. org. Retrieved 2012-09-14
  10. Empreintes digitalis pour les enfants d'une école de Londres (French)
  11. Ross, A. ; Jain, A. (2004). "Estimating fingerprint deformation". Proceedings of the International Conference on Biometric Authentication (ICBA). Empreintes digitales pour les enfants d'une école de Londres (French)
  12. Fingerprinting of UK school kids causes outcry, The Register, July 22, 2002 (English)
  13. Child fingerprint plan considered, BBC, March 4, 2007 (English)
  14. Stephen Musil (22 September 2013). "Hackers claim to have defeated Apple's Touch ID print sensor". Cnet. CBS Interactive Inc. Retrieved 23 September 2013
  15. "Peers slam school fingerprinting". BBC News. March 19, 2007. Retrieved 2 September 2010
  16. https://www. google. co. in/?gws_rd=ssl#q=sm630+fingerprint+ module +PDF
Index Terms

Computer Science
Information Sciences

Keywords

Multimodal Biometrics Fingerprint Recognition Voice Recognition Access Control