materials and methods..security system using modified biometric fingerprint recognitio1

Upload: angelica-genova

Post on 08-Mar-2016

1 views

Category:

Documents


0 download

DESCRIPTION

Materials and Methodology

TRANSCRIPT

329

CHAPTER III

MATERIALS AND METHODOLOGY

This section presents the essential details the materials and methodology of the study engages. This chapter consists of the research design, research methodology, instrumentation, data gathering procedure, and statistical treatment. Moreover, explanations of the whole measures on which the research will go through will be discussed.

Research Design

The structure of the research entitled Security System Using Modified Biometric Fingerprint Recognition will be briefly introduced. Characterization of the different components wherein the study will undergo experimental method through the aid of different electronics materials are going to be presented. Furthermore, includes a concise discussion of how the data will be administered and collected until the final process of the study.The study which involves the integration of different electronics devices to form an organize system aims to secure school premises comprises of different steps. In addition, the design includes two main procedure, the developing of the system and the gathering of data. The primary main step is the developing of the system which contains different methods. Initially the process starts through the acquisition of materials, which compose of different devices in relation with the integration of the security system. The next process under the developmental method, is the combination of the different components to form the integral whole of the system. The final step under the primary main measure, is the installation of the device system. Installation requires the wholly integrated electronic device security system to be set up in a certain area inside the school premises. Secondary main procedure comprises the gathering of data. Underlying this procedure is the enrollment of school authority personnels fingerprint whom has the right to enter an area or a room inside the school building. This group of peoples fingerprints are the only valid thumbprints that the fingerprint sensor will accept. While invalid thumbprints of persons will be gathered also and form part of the experimentation of the effectiveness of the system. The data that will be gathered will be tabularize and will be analyze statistically to arrive with the result of the study. Research Methodology

Sufficient details of the procedures to be employed in the study will be presented. Such description is important in evaluating the study. Moreover, this section presents the process done during the whole actual experimentation through the help of useful materials and methods.The design includes two main procedure, the developing of the system and the gathering of data. Initial main procedure of the research is the developmental methods of the system, which includes the acquisition of materials. The security system will compose of different components such as Arduino Duemilanove, Biometric Fingerprint, Electronic Locks, GSM, LCD, and Keypad Module. These different devices is with relation with the integration of the security system. The heart of the security system, the Arduino Duemilanove, is supplied by a 9 to 12 Vdc. Arduino has 14 digital outputs, 6 analog inputs, and has transmitter (TX) and receiver (RX). The Arduino controls the operation of the GSM and the Liquid Cristal Display or LCD of the system. While the Biometric Finger Print is a device which serves as the key to unlock the door which is installed with an electronic locks that has an input and output of 12Vdc. The LCD supplied by 5Vdc will be used to display the current status of the system whether it is activated or not. The keypad module is used to control the security system and it must be set into ARM mode to activate the system. The security measure comprises of the GSM. When a failure of attempt in the finger print scanner is detected GSM will be activated. Through this the school authority personnel will be notified through SMS alert. This devices will form components of the security system. The next process will be the combination of the devices to arrive with the design of the system. After the integration, the next process will be the installment of the device in a certain room in the school. The device will be placed at the door of the room.The following main procedure comprises the gathering of data. Underlying this procedure is the enrollment of the sets of personnel comprising each with ten members involving of the school authority personnels fingerprint whom has the right to enter an area or a room inside the school building. Another set of persons who has invalid fingerprint will be chosen. This persons will be part of the experimentation to test the effectiveness of the study. The experimentation will follow that comprises authentication of group of peoples fingerprints are the only valid thumbprints that the fingerprint sensor will accept. While invalid thumbprints of persons will be gathered also and form part of the experimentation of the effectiveness of the system. The next process will be the conduction of survey. The content of the survey will validated the results of the study. Application of the statistical tool with the survey will be applied. The data that will be gathered will be tabularize and will be analyze statistically to arrive with the result of the study. Instrumentation

In this section, the instruments to be used in the study in order to obtain data will be briefly summarized. Discussion of the section involves also the measure of dependent and independent variables. The process will be presented on why the instrument will be used will yield reliable and useful data for the study.For the researcher to obtain data that will served as basis of experimentation and analyzation, a survey will be done. The survey will contain questionnaires related effectiveness of the integrated system. The questionnaires will generate ratings from the evaluators whether they find the integrated system an effective security measure. Through the assistance of the variables and set ups in the study reliable data will be obtained. Security of a certain area and the method of securing the area are the dependent and independent variables respectively. The controlled set up in the study is the usual method of securing a certain room in a school area while the experimental set up of the study is the method of securing a specific room using the security system using modified biometric fingerprint recognition. These set ups and variables will be useful in gathering data for experimentation.

Data Gathering Procedure

This section contains the procedure followed from the time of the distribution of the instrument and questionnaire up to the time of retrieval. This part elaborates how the interview was conducted, how the questionnaires were retrieved, or how the test was administered. The general plan for how the data will be collected will be explained.The contents of the survey of the integrated device namely Security System Using Modified Biometric Fingerprint Recognition which comprises the questionnaires will be assessed to four sets of purposively chosen evaluators, each set with ten members, whom will be present during the testing and has personally attempt the device for themselves. This will generate reviews from the respondents according to the performance of the security system. The questionnaires will be retrieved after the respondents answers the given survey. The test will be performed with the involvement of ten persons which fingerprints are enrolled in the system of the fingerprint scanner and each one of them will place their thumb at the sensor and then automatically the system configures the print and the door will be access. Another set of people whose fingerprints are not enrolled and verified by the scanner will be asked to attempt scanning their thumb to the scanner. This will verify that a SMS alert will be sent whenever some unregistered person attempts to access the entrance of the room.

Statistical Treatment

This part presents the statistical tools used in treating the data. This includes analyzation of the survey through the application of analytical tools will be useful for coming up with a result of the study. Statistical tools will also determine generalizations for the conclusion.Chi Square will be the statistical tool to be used in the study in order to determine the significance differences between the two set ups, the controlled and the experimental set ups, which is the set ups where in controlled is the usual method of securing school premises while the experimental is the one where the security system will be used for securing the area. The study will consider the study which aims to investigate effectiveness of the device namely Security System Using Modified Biometric Fingerprint Recognition when compares to the usual method of securing school areas. Results from the survey conducted to four sets of respondents each with ten members will be essential part of the statistical tool.

Endnotes

Baras J., and Ivanov V. (2011). Authentication of Fingerprint Scanners. Institute for Systems Research, University of Maryland, College Park, MD 20742, USA IEEE Cappelli R., Ferrara M., and Maltoni D. (June 2008). On the Operational Quality of Fingerprint Scanners. IEEE Transactions on Information Forensics and Security, 3 (2) Faundez-Zanuy M. (August 2004). A Door-Opening System Using a Low-Cost Fingerprint Scanner and a PC. IEEE A&E Systems Magazine. Ferrara M., Franco A. And Maltoni D. (2007). Estimating Image Focusing in Fingerprint Scanners. C. d. L. Scienze dell 'Informazione - Universita di Bologna, via Sacchi 3, 47023 Cesena, ITALY IEEE Oancea C. (May 2011). GSM Infrastructure Used for Data Transmission. Politehnica University of Bucharest, Bucharest, RO 060042, Romania. Kun Z., Yinghong H., Yuchun M., and Zhuang L. (2011). General Application Research on GSM Module. Hainan Key Laboratory of Embedded Systems Qiongzhou University Sanya, Hainan Province 572022, China IEEE.