Retina - biometric computer security systems, Computer Engineering

Retina - Biometric Computer Security Systems

The next security technology that explained in this report is retina security technology which is very famous in a lot of spy movie. Although retina is an outstanding and perfect security device, it can not be popularized in human’s daily life. Firstly, retina contains a large amount of vessels which absorbs more light than the surrounding area. The retina scanner device can recognize retina by casting a ray of low energy light into human’s retina when they see through the device. However, according to Biometric Scanner (2009), the person who wants to be recognized should concentrate his eyes on the scanner device for more than 10 seconds. The description stated above is the principle of operating retina scanning device.

342_Retina - Biometric Computer Security Systems.png

According to the principle of retina scanner, it is actually a dependable security system. However, a lot of scientists continually study for the ray from the device because users still doubt whether the ray is harmful for human’s eyesight or not (Biometric Scanner 2009). Furthermore, using this security system is not only time consuming, but also making user uncomfortable due to the 10 seconds concentration. With this drawbacks and the expense, retina can not be commonly used at present society.

Posted Date: 4/2/2013 2:50:02 AM | Location : United States







Related Discussions:- Retina - biometric computer security systems, Assignment Help, Ask Question on Retina - biometric computer security systems, Get Answer, Expert's Help, Retina - biometric computer security systems Discussions

Write discussion on Retina - biometric computer security systems
Your posts are moderated
Related Questions
Explain program interpretation process. In a program interpretation process , the interpreter reads the source program and stores this in its memory. This bridges an executi

Explain the differences between Logical and physical address space Logical Vs physical address space (1) An address produced by the CPU is commonly referred to like a logica

Perceptrons: However the weights in any ANN are usually just real numbers and the learning problem boils down to choosing the best value for each weight in the network. Becaus

Automatic Stock Control System in a Supermarket -  Bar codes are associated to all goods/items sold by the supermarket as a means of identification -  Every bar code is asso

What are the types of data warehouses? Various types of data warehouses are illustrated below: a) Financial Data Warehouses b) Insurance Data Warehouses c) Human Resou

Solve the assignment of NFA-- Finite Automata and Formal Language Project Description: I have an assignment on Finite Automata and Formal Languages ( Nondeterministic Fini

Define about the Objects The object notation is the same in basic form as that for a class. There are three differences among the notations, these are given below: With

Explain the working of broad band ISDN. BISDN Configuration: Figure shows how access to the BISDN network is accomplished. All peripheral devices are interfaced to the acces

Explain Implementation techniques Implementation techniques(e.g. remote invocation, HTTP). An event-based cooperation can be executed using message passing or it can  be based

What are the different types of parameters? Formal Parameters: Parameters, which are described during the definition of subroutine with the FORM statement.