A. Y. B. Hashim, Badrul Hisyam Nawawi, Mohd Hanafi Shafii, M. S. Rahim
{"title":"Authentication Model Using Multiple Sensors Input","authors":"A. Y. B. Hashim, Badrul Hisyam Nawawi, Mohd Hanafi Shafii, M. S. Rahim","doi":"10.1109/ICSAP.2009.32","DOIUrl":null,"url":null,"abstract":"This paper presents a non-novel way of mathematical abstraction, but unique in design approach to a security system. It offers solution to an authentication model for an access control system that has multiple inputs. The approach discussed comprise of procedures that begins by assigning definitions to every components, the flow of information, and ends through execution styles. It has been tested roughly using some off-the-shelf software and equipment. The results show that fusion of data obtained from various sensors is possible by following a prescribed architecture that intrusion activity performed by unwanted persons should be difficult.","PeriodicalId":176934,"journal":{"name":"2009 International Conference on Signal Acquisition and Processing","volume":"54 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2009-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2009 International Conference on Signal Acquisition and Processing","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICSAP.2009.32","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
This paper presents a non-novel way of mathematical abstraction, but unique in design approach to a security system. It offers solution to an authentication model for an access control system that has multiple inputs. The approach discussed comprise of procedures that begins by assigning definitions to every components, the flow of information, and ends through execution styles. It has been tested roughly using some off-the-shelf software and equipment. The results show that fusion of data obtained from various sensors is possible by following a prescribed architecture that intrusion activity performed by unwanted persons should be difficult.