CHAPTER 1
INTRODUCTION
1.1 Introduction to Project
Fingerprint directional
field is defined as the local orientation ridge valley structure,
explain the gross structure or form the basis of fingerprints. It is widely used
in fingerprint registration or reference point location, classification, and is
suitable. Locations are presented in different reference point for the sine
component orientation among the adjacent field.
Automatic fingerprint
recognition system is often confronted with problems of translation during
fingerprint acquisition.Therefore, the first step necessary for fingerprint
alignment is to find the core point of the directional field of fingerprints
based on system index. However, the system index is able to find the singular
points, thus the problem arises for fingerprints of the gate.
As for the fingerprint
analysis, principle component analysis seems to be the method of choice. A
method is proposed based on the estimated high-resolution field direction for
the computation of fingerprints with the instructions in each pixel location.
Gradient corresponding with the axis of fingerprints with the function with a
probability of belong with the largest value.
Fingerprint recognition or fingerprint authentication refers to the automated method of verifying a match between two human fingerprints . Fingerprints are one of many forms of biometrics used to identify individuals and verify their identity. The three basic patterns
of fingerprint ridges are the arch, loop, and whorl. An arch is a pattern
where the ridges enter from one side of the finger, rise in the centre forming
an arc, and then exit the other side of the finger.
The loop is a pattern where the ridges enter from one side of
a finger, form a curve, and to exit from the same side they enter. In the whorl
pattern, ridges form circularly around a central point on the finger.
Scientists have found that family members often share the same general
fingerprint patterns, leading to the belief that these patterns are inherited .
The problems
with conventional system are the owner lost the keys and the vehicles are not
protected from stolen. With thumbprint system, it starts the engine as well as
the vehicles are fully protected by his owner. This system requires key only to
save the data. After the data are stored at ROM, owner can start the engine by
using his thumbprint. The thumbprint system is easily programmable and can
store up to ten different thumbprints. Programmed thumbprint can be added,
deleted and the system can be easily disabled by the principle owner.
The objective of
a thumbprint system is to provide user a new security system that can prevent
the vehicle from be stolen. The system is a great solution for individuals or
companies looking to add additional security to their vehicle.
1.2
Project Background
The general purpose of thumbprint system is to replace the
conventional keys for the vehicle. The thumbprint system will start the engine
by recognizing their owner. This system can store the data of owner up to four
persons. The advantage of this project is that this system can prevent the
vehicle from being stolen and the problem like missing the key.
The
conventional keys at vehicle have lot of problem. The security is very low
because the conventional key can be duplicates by others. I-key employs the
thumbprint system. Thumbprint system is the one of the preferable security for
the vehicle. This system can save the data in the form of the owner’s
thumbprint and recognize if the owner is using the vehicle. The data can be
added and deleted by the principle owner with a few simple steps. Therefore the
data cannot be copy by strangers.
1.3 Problem Statement
At
present, most systems have used new technology vehicles, such as push-button
start and smart key. But, the problem of lost or stolen cars still exist. With
the introduction of the fingerprint system as a starter, to face the overcome
problems so use the tools that called a fingerprint scanner or fingerprint
system, this tool can performs the verification process by scanning the
fingerprint, the appliance can sign that problems, because everyone has an
unique fingerprint or a different fingerprint, it can prevent the falsification
of data and lack of time.
It
is also possible to replace old technology with new fingerprint system. This
study tried to find the use of fingerprint systems in vehicle applications. In
some of these unfortunate events, the fingerprint system fails to recognize the
owner data. There are many reasons that have occurred as the owner of the hand
when in a wet, dirty and component failures. In addition, the problem is the
expense for tools used equipment is very expensive, we also have to choose a
better quality tool for users or owners.
In
terms of critical information needed to reconstruct the continual phase and
frequencies of fingerprint ridges are unknown is also common. So the
information needed to reconstruct the fingerprint realistic, such as
brightness, contrast, background noise fingerprint sensor, and the
characteristics of the ridge detail (pores, contour) is also done to it.
Therefore this problem is to reconstruct the original fingerprint image by
carrying out the following four steps, realistic fingerprints, such as
brightness, contrast and background noise sensor and fingerprint ridge
characteristics in detail.
This
system should be maintained properly for best performance. Therefore, it is
important to develop methods to estimate the reliability of the system, to
ensure it will perform satisfactorily and safely used by vehicle owners when
needed.
1.4
Objectives
of Project
The main objectives of this project is:
a)
To
make the vehicle more safely and fully protected from be stolen.
b)
To
upgrade conventional key with new system.
c)
To
avoid the problem such as missing, broken and duplicate key.
1.5 Scope of project
In
this part, the device that used to start the vehicle will be designed and
construct. The designed circuit must using fingerprint reader, key as the input
component, starter motor and led indicator as the output. Before design the device, the characteristic
of components must be identified and understand. Therefore, the scope of project in the device
part as shown as below;
A.
Find and select the
best component for the circuit by comparing the characteristic of each.
B.
Study the basic
programming language for coding the programming based the type of PIC that has
been selected.
C.
Design the circuit
which has several parts like input part, output part, processing part and other
else on the designing software Proteus.
D.
Construct the circuit on the breadboard by using the selected components.
E.
Conduct the testing process to make sure the device can be function very
well.
1.6
Summary of Chapter
Nowadays
developments of device and equipment that use a high technology have been
market to public. By using the high technology product it can improve the
safety of the vehicle. These situations happen starting early year of 2000,
because it was the first step the high technology take the place in human life
from the use of the device or equipment that made from the high technology.
The
system is designed for make the vehicle become more safety and look more
intelligent. The thumbprint system will solve many problems like missing the
key, broken key and stolen cars. These systems are believed will replace the
conventional key in the future.Beside that based on the research to design this
thumbprint vehicles system, the method
use to do the project is from the internet and literature research followed by
examines by using the simulation software.This project aims for all type of
car. Its easy to install and use.
No comments:
Post a Comment