Retina - biometric computer security systems, Computer Engineering

Retina - Biometric Computer Security Systems

The next security technology that explained in this report is retina security technology which is very famous in a lot of spy movie. Although retina is an outstanding and perfect security device, it can not be popularized in human’s daily life. Firstly, retina contains a large amount of vessels which absorbs more light than the surrounding area. The retina scanner device can recognize retina by casting a ray of low energy light into human’s retina when they see through the device. However, according to Biometric Scanner (2009), the person who wants to be recognized should concentrate his eyes on the scanner device for more than 10 seconds. The description stated above is the principle of operating retina scanning device.

342_Retina - Biometric Computer Security Systems.png

According to the principle of retina scanner, it is actually a dependable security system. However, a lot of scientists continually study for the ray from the device because users still doubt whether the ray is harmful for human’s eyesight or not (Biometric Scanner 2009). Furthermore, using this security system is not only time consuming, but also making user uncomfortable due to the 10 seconds concentration. With this drawbacks and the expense, retina can not be commonly used at present society.

Posted Date: 4/2/2013 2:50:02 AM | Location : United States







Related Discussions:- Retina - biometric computer security systems, Assignment Help, Ask Question on Retina - biometric computer security systems, Get Answer, Expert's Help, Retina - biometric computer security systems Discussions

Write discussion on Retina - biometric computer security systems
Your posts are moderated
Related Questions
What are the primary models of Supply Chain Management? Two Primary models of Supply Chain Management are illustrated below: a. Porter’s Value Chain Model and b. Supply

Problem: (a) Describe how a Mobile Terminating call, from a PSTN phone, is processed in a GSM network. Illustrate your answer with a diagram. (b) What is a GPRS Support node

Write a short note on pointer operators in c Pointers (that is, pointer values) are generated with the ''address-of'' operator &, which we can also think of as the ''pointer-to

What are the two types of branch prediction techniques available?  The two types of branch prediction methods are  1) Static branch prediction  2) Dynamic branch predicti

What is the difference between char a[] = "string"; and char *p = "string";? Ans) In the first case 6 bytes are assigned to the variable a which is fixed, where as in the secon

Q. What is data in computers? In modern digital computers data is signified in binary form by employing two symbols 0 and 1. These are known as binary digits or bits however da

Demonstrate Arc consistency: To demonstrate the worth of performing an arc-consistency check before starting a serarch for a solution, we'll use an example from Barbara Smith'

No, You cannot apply the link and Association interchangeably. Since link is used show the relationship among the two objects. But Association is used signify the relationship

Data Dependency It indicates to the situation in which two or more instructions share same data. The instructions in a program are able to be arranged based on relationship o

State and prove Demorgan's second theorem   Proof: Demorgan's second theorem   = A‾ + B‾ The two sides of the equation here   = A‾ + B‾ is represented through the logic d