A. Y. B. Hashim, Badrul Hisyam Nawawi, Mohd Hanafi Shafii, M. S. Rahim
{"title":"使用多传感器输入的认证模型","authors":"A. Y. B. Hashim, Badrul Hisyam Nawawi, Mohd Hanafi Shafii, M. S. Rahim","doi":"10.1109/ICSAP.2009.32","DOIUrl":null,"url":null,"abstract":"This paper presents a non-novel way of mathematical abstraction, but unique in design approach to a security system. It offers solution to an authentication model for an access control system that has multiple inputs. The approach discussed comprise of procedures that begins by assigning definitions to every components, the flow of information, and ends through execution styles. It has been tested roughly using some off-the-shelf software and equipment. The results show that fusion of data obtained from various sensors is possible by following a prescribed architecture that intrusion activity performed by unwanted persons should be difficult.","PeriodicalId":176934,"journal":{"name":"2009 International Conference on Signal Acquisition and Processing","volume":"54 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2009-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Authentication Model Using Multiple Sensors Input\",\"authors\":\"A. Y. B. Hashim, Badrul Hisyam Nawawi, Mohd Hanafi Shafii, M. S. Rahim\",\"doi\":\"10.1109/ICSAP.2009.32\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This paper presents a non-novel way of mathematical abstraction, but unique in design approach to a security system. It offers solution to an authentication model for an access control system that has multiple inputs. The approach discussed comprise of procedures that begins by assigning definitions to every components, the flow of information, and ends through execution styles. It has been tested roughly using some off-the-shelf software and equipment. The results show that fusion of data obtained from various sensors is possible by following a prescribed architecture that intrusion activity performed by unwanted persons should be difficult.\",\"PeriodicalId\":176934,\"journal\":{\"name\":\"2009 International Conference on Signal Acquisition and Processing\",\"volume\":\"54 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2009-04-03\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2009 International Conference on Signal Acquisition and Processing\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICSAP.2009.32\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2009 International Conference on Signal Acquisition and Processing","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICSAP.2009.32","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
This paper presents a non-novel way of mathematical abstraction, but unique in design approach to a security system. It offers solution to an authentication model for an access control system that has multiple inputs. The approach discussed comprise of procedures that begins by assigning definitions to every components, the flow of information, and ends through execution styles. It has been tested roughly using some off-the-shelf software and equipment. The results show that fusion of data obtained from various sensors is possible by following a prescribed architecture that intrusion activity performed by unwanted persons should be difficult.