'NetAccess': Networked access to computerized-system using Iris
Based on the available secured files and information in the companies; they need to be secured by a very high system. Currently, most of companies are accessed by normal keys in order to access the offices. But, those keys might be lost or stolen. In addition, those doors can be hacked easily by thi...
Gespeichert in:
Hauptverfasser: | , , |
---|---|
Format: | Tagungsbericht |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 495 |
---|---|
container_issue | |
container_start_page | 493 |
container_title | |
container_volume | |
creator | Kadhum, M.M. Ali, M. Hassan, S. |
description | Based on the available secured files and information in the companies; they need to be secured by a very high system. Currently, most of companies are accessed by normal keys in order to access the offices. But, those keys might be lost or stolen. In addition, those doors can be hacked easily by thieves. This raises a need to improve security of such information by limiting access only to those who have authorization to do so. The traditional means, as well as biometric traits other than iris, do provide such control; yet they still have several limitations in verifying the identity of individuals. In this presents the design of an Iris Recognition System for accessing Building and Control System. |
doi_str_mv | 10.1109/NDT.2009.5272226 |
format | Conference Proceeding |
fullrecord | <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_5272226</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>5272226</ieee_id><sourcerecordid>5272226</sourcerecordid><originalsourceid>FETCH-LOGICAL-i175t-9e7e3bf13b9c4c8104021c4d92b716b137d3246878483189d59c76a12b44f2063</originalsourceid><addsrcrecordid>eNpFkM1PwkAUxNcoiYDcTbz0xqn1vbev--HFEPwiIXjBM2m3W7NqhXRLCP71opJ4mplfMnMYIS4RMkSw14u7ZUYANstJE5E6EQNkYmaFeX76H1ifiT4dWGo0mZ4Y_JQsMCk4F6MY3wBAEkhWsi9uxwvfTZzzMY5vkoPfrdt3XyXFL0q6deLWzWbb-TZ8-SqN-9j5JtnG8PmazNoQL0SvLj6iHx11KF4e7pfTp3T-_DibTuZpQJ13qfXay7JGWVrHziAwEDquLJUaVYlSV5JYGW3YSDS2yq3TqkAqmWsCJYfi6m83eO9XmzY0RbtfHZ-Q3066S14</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>'NetAccess': Networked access to computerized-system using Iris</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Kadhum, M.M. ; Ali, M. ; Hassan, S.</creator><creatorcontrib>Kadhum, M.M. ; Ali, M. ; Hassan, S.</creatorcontrib><description>Based on the available secured files and information in the companies; they need to be secured by a very high system. Currently, most of companies are accessed by normal keys in order to access the offices. But, those keys might be lost or stolen. In addition, those doors can be hacked easily by thieves. This raises a need to improve security of such information by limiting access only to those who have authorization to do so. The traditional means, as well as biometric traits other than iris, do provide such control; yet they still have several limitations in verifying the identity of individuals. In this presents the design of an Iris Recognition System for accessing Building and Control System.</description><identifier>ISSN: 2155-8728</identifier><identifier>ISBN: 1424446147</identifier><identifier>ISBN: 9781424446148</identifier><identifier>EISBN: 1424446155</identifier><identifier>EISBN: 9781424446155</identifier><identifier>DOI: 10.1109/NDT.2009.5272226</identifier><identifier>LCCN: 2009904260</identifier><language>eng</language><publisher>IEEE</publisher><subject>Authorization ; Biometrics ; Buildings ; Computer networks ; Image Processing ; Information security ; IP networks ; Iris recognition ; Iris Recognition System ; Lighting control ; Microcontrollers ; Size control ; TCP/IP Network</subject><ispartof>2009 First International Conference on Networked Digital Technologies, 2009, p.493-495</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/5272226$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,776,780,785,786,2052,27902,54895</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/5272226$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Kadhum, M.M.</creatorcontrib><creatorcontrib>Ali, M.</creatorcontrib><creatorcontrib>Hassan, S.</creatorcontrib><title>'NetAccess': Networked access to computerized-system using Iris</title><title>2009 First International Conference on Networked Digital Technologies</title><addtitle>NDT</addtitle><description>Based on the available secured files and information in the companies; they need to be secured by a very high system. Currently, most of companies are accessed by normal keys in order to access the offices. But, those keys might be lost or stolen. In addition, those doors can be hacked easily by thieves. This raises a need to improve security of such information by limiting access only to those who have authorization to do so. The traditional means, as well as biometric traits other than iris, do provide such control; yet they still have several limitations in verifying the identity of individuals. In this presents the design of an Iris Recognition System for accessing Building and Control System.</description><subject>Authorization</subject><subject>Biometrics</subject><subject>Buildings</subject><subject>Computer networks</subject><subject>Image Processing</subject><subject>Information security</subject><subject>IP networks</subject><subject>Iris recognition</subject><subject>Iris Recognition System</subject><subject>Lighting control</subject><subject>Microcontrollers</subject><subject>Size control</subject><subject>TCP/IP Network</subject><issn>2155-8728</issn><isbn>1424446147</isbn><isbn>9781424446148</isbn><isbn>1424446155</isbn><isbn>9781424446155</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2009</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><sourceid>RIE</sourceid><recordid>eNpFkM1PwkAUxNcoiYDcTbz0xqn1vbev--HFEPwiIXjBM2m3W7NqhXRLCP71opJ4mplfMnMYIS4RMkSw14u7ZUYANstJE5E6EQNkYmaFeX76H1ifiT4dWGo0mZ4Y_JQsMCk4F6MY3wBAEkhWsi9uxwvfTZzzMY5vkoPfrdt3XyXFL0q6deLWzWbb-TZ8-SqN-9j5JtnG8PmazNoQL0SvLj6iHx11KF4e7pfTp3T-_DibTuZpQJ13qfXay7JGWVrHziAwEDquLJUaVYlSV5JYGW3YSDS2yq3TqkAqmWsCJYfi6m83eO9XmzY0RbtfHZ-Q3066S14</recordid><startdate>200907</startdate><enddate>200907</enddate><creator>Kadhum, M.M.</creator><creator>Ali, M.</creator><creator>Hassan, S.</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>200907</creationdate><title>'NetAccess': Networked access to computerized-system using Iris</title><author>Kadhum, M.M. ; Ali, M. ; Hassan, S.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i175t-9e7e3bf13b9c4c8104021c4d92b716b137d3246878483189d59c76a12b44f2063</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2009</creationdate><topic>Authorization</topic><topic>Biometrics</topic><topic>Buildings</topic><topic>Computer networks</topic><topic>Image Processing</topic><topic>Information security</topic><topic>IP networks</topic><topic>Iris recognition</topic><topic>Iris Recognition System</topic><topic>Lighting control</topic><topic>Microcontrollers</topic><topic>Size control</topic><topic>TCP/IP Network</topic><toplevel>online_resources</toplevel><creatorcontrib>Kadhum, M.M.</creatorcontrib><creatorcontrib>Ali, M.</creatorcontrib><creatorcontrib>Hassan, S.</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Kadhum, M.M.</au><au>Ali, M.</au><au>Hassan, S.</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>'NetAccess': Networked access to computerized-system using Iris</atitle><btitle>2009 First International Conference on Networked Digital Technologies</btitle><stitle>NDT</stitle><date>2009-07</date><risdate>2009</risdate><spage>493</spage><epage>495</epage><pages>493-495</pages><issn>2155-8728</issn><isbn>1424446147</isbn><isbn>9781424446148</isbn><eisbn>1424446155</eisbn><eisbn>9781424446155</eisbn><abstract>Based on the available secured files and information in the companies; they need to be secured by a very high system. Currently, most of companies are accessed by normal keys in order to access the offices. But, those keys might be lost or stolen. In addition, those doors can be hacked easily by thieves. This raises a need to improve security of such information by limiting access only to those who have authorization to do so. The traditional means, as well as biometric traits other than iris, do provide such control; yet they still have several limitations in verifying the identity of individuals. In this presents the design of an Iris Recognition System for accessing Building and Control System.</abstract><pub>IEEE</pub><doi>10.1109/NDT.2009.5272226</doi><tpages>3</tpages></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISSN: 2155-8728 |
ispartof | 2009 First International Conference on Networked Digital Technologies, 2009, p.493-495 |
issn | 2155-8728 |
language | eng |
recordid | cdi_ieee_primary_5272226 |
source | IEEE Electronic Library (IEL) Conference Proceedings |
subjects | Authorization Biometrics Buildings Computer networks Image Processing Information security IP networks Iris recognition Iris Recognition System Lighting control Microcontrollers Size control TCP/IP Network |
title | 'NetAccess': Networked access to computerized-system using Iris |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-02T02%3A09%3A07IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle='NetAccess':%20Networked%20access%20to%20computerized-system%20using%20Iris&rft.btitle=2009%20First%20International%20Conference%20on%20Networked%20Digital%20Technologies&rft.au=Kadhum,%20M.M.&rft.date=2009-07&rft.spage=493&rft.epage=495&rft.pages=493-495&rft.issn=2155-8728&rft.isbn=1424446147&rft.isbn_list=9781424446148&rft_id=info:doi/10.1109/NDT.2009.5272226&rft_dat=%3Cieee_6IE%3E5272226%3C/ieee_6IE%3E%3Curl%3E%3C/url%3E&rft.eisbn=1424446155&rft.eisbn_list=9781424446155&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=5272226&rfr_iscdi=true |