Biometric Access Control Implementation Using 32 bit Arm Processor


This paper describes a fingerprint system for a secure perimeter, allowing access to only those people who are identified by the officials using bio-metric identification of finger print. The system would work in both online and offline mode. System also employs Power over Ethernet. The goal of this project is to develop a complete system for fingerprint identification. The fingerprint scanning device utilizes serial communication. This device will be connected to the microprocessor using RS-232 ports. The system will consist of an LM3S6965 microprocessor, LCD display, fingerprint sensor, electronic door strike, and MCU to USB PC interfacing. Software Code for the PC allows the owner to register and maintain the attendance record for finger-prints and monitor door entry. LCD's and LED's will be used to display whether or not access was granted or denied.

Did you like this research project?

To get this research project Guidelines, Training and Code... Click Here

PROJECT TITLE :CEREBRE: A Novel Method for Very High Accuracy Event-Related Potential Biometric IdentificationABSTRACT:The vast majority of existing work on brain biometrics has been conducted on the continued electroencephalogram.
PROJECT TITLE :Design, Implementation, and Performance Evaluation of a Flexible Low-Latency Nanowatt Wake-Up Radio ReceiverABSTRACT:Wireless sensor networks (WSNs) have received vital attention in recent years and have found a
PROJECT TITLE :Design, Control, and Validation of a Charge-Sustaining Parallel Hybrid BicycleABSTRACT:Traffic congestion, energy, and environmental concerns are boosting the interest for light electric vehicles. Electrically power-assisted
PROJECT TITLE :Flexible Biometric Online Speaker-Verification System Implemented on FPGA Using Vector Floating-Point UnitsABSTRACT:This paper presents the implementation of a speaker-verification system on field programmable gate
PROJECT TITLE :Biometric Liveness Detection: Challenges and Research OpportunitiesABSTRACT:In an exceedingly spoofing attack, an impostor masquerades as a legitimate user by replicating that user's biometrics. Although strategies

Ready to Complete Your Academic MTech Project Work In Affordable Price ?

Project Enquiry