Researcher: Maycee Anne Rufino
Research Adviser: Mrs. Ma. Regaele Olarte
Statement of the Problem
The study sought to devise a system to protect every computer from hacking and unwanted file sharing due to usage without permission by unauthorized users. The researcher utilized fingerprint-based biometric security system on the power switch of personal computer, thus making it unquestionably “personal.”
Specifically, the study aimed to answer the following questions:
1. How should the system be designed and developed in order to:
a. Secure the user’s data from hacking or sharing,
b. Provide an account security for the computer user,
c. Ensure that the system is protected against alteration and not prone to errors?
2. What is the level of performance of the system based on the following criteria:
a. Reliability
b. Accessibility
c. Efficiency
d. Functionality?
Hypothesis
The fingerprint-based biometric security system on personal computer with remote access for the private user is effective in terms of the specified criteria.
Scope and Limitations
The fingerprint-based biometric security system on personal computer is more accessible, secured, accountable and accurate. It is in the registered fingerprint where an account is created for hassle-free admission to the system. Furthermore, transactions do not consume much time and effort since the information needed to connect and to access one’s account is already automated.
The following were the scope and limitations of the study:
- The study only focused on the general transaction of database and of safe-keeping for the data-security of personal computers.
- This mechanism was not advisable for shared computers but merely for personal use, as only an authorized person could gain access on the most important data and information stored in the computer.
- The system would not operate if the user is unauthorized or unregistered. Only authorized user with registered thumb mark and password can get into the system.
- This device can register and hold up to five authorized users only to access the system.
- The fingerprint-based power switch can also be used on any technology containing switch. (e.g. lighting, appliances, motorcycles etc.)
What about the methodology, such as the parts that you would be using and how you would assemble them together? thanks
ReplyDeletemethodology please please please
ReplyDeletecomplete data please :|
ReplyDeletecomplete sa na plsssssss
ReplyDeleteHello! Could you please share the procedure of how this is done(methodology and the other parts) .I'm really grateful if you could...please..please...please....this is my e-mail:luisandrei61@yahoo.com
ReplyDeleteQUANTUM BINARY SIGNALS
ReplyDeleteProfessional trading signals delivered to your cell phone daily.
Start following our signals right now & earn up to 270% per day.
Can I have a copy of the whole paper of this?
ReplyDeleteHello. Can I have a glance with the procedure on how will it be done?
ReplyDeletecan i have ypur write up ? send to my email plsss
ReplyDelete
ReplyDeleteHello! Can I have the copy of your paper, you can send it here!
@itsmissmusic@gmail.com
thank you so much xoxo