Latest: Nike Release Sales/Launch Date For New HyperAdapt 1.0 Self-Lacing Sneakers.

Posted by with No comments
Latest: Nike Release Sales/Launch Date For New HyperAdapt 1.0 Self-Lacing Sneakers.
Latest: Nike Release Sales/Launch Date For New HyperAdapt 1.0 Self-Lacing Sneakers.

If we can remember well in November of 2016 which was basically last year, the well-known company Nike introduced its first-ever self-lacing sneaker with the debut of the HyperAdapt 1.0 sneakers. Now in the year 2017, a year removed the initial release, the company Nike looks forward to continuing pushing the innovative self-lacing sneaker with a new colorway of the technically advanced shoe before the end of this year 2017.



Furthermore, launching in the next few days to come, the latest HyperAdapt 1.0 sneakers will feature a royal blue upper with hits of navy blue on the toe front and Swoosh branding. Also with black accents complementing the heel of the sneakers, a white colorway is added to the midsole of the sneakers to give the HyperAdapt 1.0 a contrast hue. With the HyperAdapt 1.0 made out of a mesh material, the HyperAdapt 1.0 come equipped with LED (Light Emitting Diode) lights on the heel and midsole that light up when a user uses the self-lacing system.


Latest: Nike Release Sales/Launch Date For New HyperAdapt 1.0 Self-Lacing Sneakers
Latest: Nike Release Sales/Launch Date For New HyperAdapt 1.0 Self-Lacing Sneakers

Morealso, the HyperAdapt 1.0 inspired by Marty McFly’s Mag shoes from the Back to the Future movie franchise, the first generation of the Nike HyperAdapt 1.0 sneakers includes electrical and mechanical engineering with Nike’s innovative Zoom Air unit.


Finally, the HyperAdapt 1.0 will be set to release on Friday, October 27, 2017 ( 27/10/2017 ), the Nike HyperAdapt 1.0 royal blue iteration will also be made available at select Nike retailers and accounts as well as nike.com. The HyperAdapt 1.0 sneaker will have a price tag of $720 (N259920), the surprising thing is that the sneakers will only be available for a limited amount of time only, so what are you waiting for, hurry up and grab a pair of the HyperAdapt 1.0 fast.

A RESEARCH PROPOSAL ON EFFECTS OF ESSENTIAL OILS ON MEDICAL PATHOGENIC BACTERIA

Posted by with No comments
A RESEARCH PROPOSAL ON EFFECTS OF ESSENTIAL OILS ON MEDICAL PATHOGENIC BACTERIA
A RESEARCH PROPOSAL ON EFFECTS OF ESSENTIAL OILS ON MEDICAL PATHOGENIC BACTERIA

MADONNA UNIVERSITY,
ELELE, RIVERS STATE,
NIGERIA.

EFFECTS OF ESSENTIAL OILS ON MEDICAL PATHOGENIC BACTERIA

BY
O******* E*******
MB/12/***.

A RESEARCH PROPOSAL SUBMITTED TO THE
 DEPARTMENT OF MICROBIOLOGY, FACULTY OF SCIENCES, 
MADONNA UNIVERSITY IN PARTIAL FULFILMENT
 OF THE REQUIREMENTS FOR THE AWARD OF
 A BACHELOR OF SCIENCES (B.Sc.) IN MICROBIOLOGY

SUPERVISION: DR. W***** B*****
MAY, 2016.




CONTENTS
Introduction
Aim
Objectives
Methodology
References

  
INTRODUCTION
The increasing resistance of microorganisms to conventional chemicals and drugs has prompted scientists to search for novel sources of biocides with broad-spectrum activities (Abad, et al., 2007). In nature, Essential oil play an important role in the protection of plants. They may also attract some insects to promote the dispersion of pollens and seeds or keep away other undesirable insects. Thus, Essential oil can play a role in mediating the interactions of plants with the environment (Bakkali, et al., 2008).
Essential oils are aromatic liquid materials that are derived from plant material (flowers, buds, seeds, leaves, twigs, bark, stems, herbs, wood, fruits and roots) but are generally stored by the plant in secretory cells, cavities, canals, glandular trichomes or epidermic cells. (Van de Braak and Leijten, 1999). They can be obtained by expression, fermentation, effleurage or extraction with the method of steam being only for commercial purpose. Essential oils are concentrated natural products with strong smells that are produced by aromatic plants as secondary metabolites. These oils are present as variable mixtures of primarily terpenoids, especially monoterpenes (C10) and sesquiterpenes (C15), although diterpenes (C20) may also be present. Essential oils are liquid, volatile, limpid and coloured and are soluble in lipids and organic solvents that have a lower density than water. Essential oils are extracted from various aromatic plants that are generally found in temperate or warm countries, where they often represent an important part of the traditional pharmacopoeia. These plants may be known for their antioxidant effects as well as their antiseptic and medicinal properties and fragrance and are often used in the preservation of foods and as analgesics, sedatives, anti-inflammatories, spasmolytics and local anaesthetics (Bakkali, et al., 2008). Essential oils contain a wide series of secondary metabolites that can inhibit or slow the growth of bacteria, yeasts and moulds (De Martino et al., 2009). The Essential oils and their components have a variety of targets, particularly the membrane and cytoplasm, and in certain situations, they completely alter the morphology of the cells. Essential oils of medicinal plants have been used traditionally against pathogenic bacteria that caused infectious disease in human. In many parts of the world, the extracts and essential oil of medicinal plants with active biological compounds are used for their antimicrobial and antiviral properties that have been used in folk medicine (Hassawi and Kharma, 2006). The WHO considers phytotherapy in its health programs and suggests basic procedures for the validation of drugs in developing countries. Infectious diseases are the second leading cause of death worldwide (Fazly-Bazzaz et al., 2005). Generally, Gram-negative bacteria are more resistant to Essential oils than Gram-positive bacteria (Trombetta et al., 2005). The structure of the Gram-positive bacteria cell wall allows hydrophobic molecules to easily penetrate the cells and act on both the cell wall and within the cytoplasm. Phenolic compounds, which are also present in the Essential oil, generally show antimicrobial activity against Gram-positive bacteria.


AIM

This brief review will be to determine the effects of Essential oils against medical pathogenic bacteria
OBJECTIVES

  • To study the effect of essential oils on some medical pathogenic bacteria.
  • To characterize and identify medical pathogenic bacteria·
  • To determine the phytochemical properties in plants used for the extraction of essential oils.


METHODOLOGY

Collection Of Essential Oils
I will be using Essential oils which will be gotten from Anthony Van Leeuwenhoek Research Centre Ihiagwa, Imo State. Nigeria. 

Bacterial Strains
To evaluate the effects of the Essential oils, I will be using stocked isolates which will also be acquired from Anthony Van Leeuwenhoek Research Centre Ihiagwa, Imo State. Nigeria. They will be sub-cultured in the laboratory and prepared for antimicrobial susceptibility testing. Each test organism will be sub-cultured on different media for viability testing.


Characterization And Identification Of Bacterial Isolates
Pure cultures of bacterial isolates shall be identified on the basis of their colonial morphology, microscope and biochemical characteristics. Isolates shall be identified with reference standard bacteriological manual.

Media To Be Used


The media to be used in this study shall include Mannitol Salt Agar (MSA), Eosin Methylene Blue agar (EMB), Salmonella-Shigella Agar (SSA), Nutrient Agar (NA), MacConkey Agar (MCA), and Deoxychocolate Agar (DCA)


Media Preparations
I will prepare the media that will be used based on Manufacturers specifications. An electronic balance will be used to measure the quantity of agar that will be needed with the aid of a spatula before dispensing water into the beaker of choice which will autoclaved at 1210C for 15minutes before pouring into the number of petri dishes that will be used

Preparation Of Inoculums

I will be using streak method to inoculate my isolates on the media that will be prepared before incubating at room temperature (370C) for 24hours. After incubation, I will standardize my cultures using 0.5 McFarland standard turbidity of 1% Bacl and 1%H2SO4.

I will prepare Muller Hinton Agar using manufacturer’s specifications after autoclaving and then allow to solidify.

After that, I will use different swab sticks to pick from my inoculum, mix it in peptone water inside the bottle and then smear it evenly on of the Muller Hinton Agar plate and using a spreader, spread the inoculum evenly on the agar surface and then leave it to incubate at 370C for 24hours.

Preparation Of Antimicrobial Disc

I will impregnate sterile antimicrobial disc (Whatman 6mm) using Volume to Volume dilution to introduce the Essential oils to the disc. Ciproflaxacin will be used as my positive control disc and Dimethylsulphuric Acid (DMSO) as my negative control disc.

Disc Diffusion Method

I will place my disc that will be impregnated with Essential oils and standardized antibiotic disc on the surface of the standardized 0.5 McFarland inoculum and then wait for a period of 30minutes for absorption before incubating at 370C for 24hours and then check to see if there is/are susceptibilities or zones of inhibition.


REFERENCES

Abad, M.J., Ansuategui, M., Bermejo, P. (2007). Active Antifungal Substances from Natural Sources: ARCHIVOC 2007: 116–145.

Bakkali, F., Averbeck, S., Averbeck, D., Idaomar, M. (2008). Biological Effects of Essential Oils—a Review: Food Chem. Toxicol; 46: 446–475.

De Martino, L., De Feo, V., Nazzaro, F. (2009). Chemical Composition and In Vitro Antimicrobial and Mutagenic Activities of Seven Lamiaceae Essential Oils: Molecules; 14: 4213–4230.

Fazly-Bazzaz BS, Khajehkaramadin, M., Shokooheizadeh, HR. (2005). In Vitro Antibacterial Activity Of Rheum Ribes Extract Obtained From Various Plant Parts Against Clinical Isolates Of Gram-Negative Pathogens. Iranian J. Pharmacol. Res.; 2: 87-91.

Hassawi, D., Kharma, A. (2006). Antimicrobial Activity of Some Medicinal Plants against Candida Albicans. J. Biol. Sci.; 6: 109-114.

Trombetta, D., Castelli, F., Sarpietro, M.G., Venuti, V., Cristani, M., Daniele, C., Saija, A., Mazzanti, G., Bisignano, G. (2005). Mechanisms of Antibacterial Action of Three Monoterpenes. Antimicrob. Agents Chemother: 49; 2474–2478.

Van de Braak, S.A.A.J., Leijten, G.C.J.J., (1999). Essential Oils and Oleoresins: A Survey in the Netherlands and other Major Markets in the European Union. CBI, Centre for the Promotion of Imports from Developing Countries, Rotterdam: p. 116.


Searches related to A RESEARCH PROPOSAL ON EFFECTS OF ESSENTIAL OILS ON MEDICAL PATHOGENIC BACTERIA

>>> mode of action of essential oils on bacteria

>>> effect of essential oils on bacterial growth
>>> the effect of different essential oils on bacterial growth experiment
>>> effect of essential oils on bacterial growth experiment
>>> bacteria killing essential oils
>>> effect of essential oils on e coli
>>> antimicrobial essential oils list
>>> effect of menthol on bacteria

Medication Drug Options For Mental Health Issues

Posted by with No comments
MEDICATION DRUG OPTIONS FOR MENTAL HEALTH ISSUES
MEDICATION DRUG OPTIONS FOR MENTAL HEALTH ISSUES
Fortunately, prescript drugs can be used to treat mental health disorders in conjunction with behavioral therapy or cognitive therapy, antidepressants, mood stabilizers, and antipsychotics are the broad types of medically prescribed drugs to treat mental illness.



MENTAL HEALTH DRUGS POSSIBLE OPTIONS

Depending on the disorder, different medication will be prescribed. Antidepressant Such as Paxil, Zoloft, Prozac and a variety of SSRIs, SNRIs and MAOIs can be used to treat depression. Mood stabilizers such as lithium tablets are used to treat bipolar disorder, as are anticonvulsants like Depakote. Antipsychotics like olanzapine or clozapine are used to treat schizophrenia or psychotic depression.


MEDICATION SIDE EFFECTS

Some of the side effects of mental health medication include nausea, headache, change in appetite, dry mouth increased urination, change in libido, irritability, blurred vision and drowsiness. Other side effects can occur; each person body and brain chemistry is unique, and it is impossible to predict with certainty how a given medication will affect you or how well it will work. People who prescribed these medications should regularly communicate with their doctors and notify them of any side effects.


Searches related to Medication Drug Options For Mental Health Issues

>>> medication for mental illness pros and cons
>>> psychiatric drugs list pdf
>>> psychiatric medications cheat sheet
>>> psychiatric drugs chart
>>> psychotropic medication side effects chart
>>> psychotropic drugs list
>>> antipsychotic drugs side effects
>>> psychotropic drugs side effects

April Is The Best Month To Buy Android Phones, Gadgets And Devices | The Best Month To Buy Android Phones, Gadgets And Devices

Posted by with No comments
diagrams of android phones April Is The Best Month To Buy Android Phones, Gadgets And Devices   |  The Best Month To Buy Android Phones, Gadgets And Devices
April Is The Best Month To Buy Android Phones, Gadgets And Devices   |  The Best Month To Buy Android Phones, Gadgets And Devices

Image of android April Is The Best Month To Buy Android Phones, Gadgets And Devices   |  The Best Month To Buy Android Phones, Gadgets And Devices
April Is The Best Month To Buy Android Phones, Gadgets And Devices   |  The Best Month To Buy Android Phones, Gadgets And Devices
In our world of Android smartphones and devices can often be disorganized and chaotic, but in this year 2016, it seems to have settled finally on the precious month of April for the availability and show of the widest range and collection of new desirable  devices and smartphones. Six months after the prestigious company, Google’s release of the latest Android Marshmallow operating system, all the hardware producers manufacturers in the market are now fully ready to deliver a deluge of smartphones and devices built around the most recent version of the operating system (OS). It has already begun with smartphones like the Xiaomi Mi 5, and the Samsung Galaxy S7, but in the dear month of April is when the choice and variety will fully explode.




The Huawei’s P9 showcases its high dual-camera system is ready to fully launch on April 6th, wao! ten days to my birthday, wonderful. This is also when the Meizu will also reveal its M3 Note. Then in a week later, HTC will be pulling the curtains back on one of its 2016 package, which is called the HTC 10, and Oppo will then join the fun at around the same precious time with the international release and unveiling of its R9 Plus and R9. The R9’s 16-megapixel selfie camera, which is main the competitor of the HTC’s BoomSound, or the prospect of another Huawei smartphone which has a monster battery of 3,900mAh. 

Something is going to astonish most Android fans world wide, which is the Zopo Speed 8, which fully lays claim to have title of ever being the first Deca-core smartphone to be produced.



This two key factors are driving the bumper crop of Android operating system this season of the year (spring). The precious timing of the Marshmallow operating system (OS) release and the availability of the Qualcomm’s Snapdragon 820 chipset. This chipset is a simple awesome new chip which deserve awesome new smartphones and devices  to show off their  maximum capabilities and features, and the 820 has already proven itself as the No 1 in our Mi 5 ,and the Samsung Galaxy S7 smart phone reviews. The more surprising aspect is Android itself. A good amount of Android OEMs presently have told the masses that it takes upwards of four months to completely integrate their developed software with that of Google’s, and lest you think that a pointless endeavor, have in mind that this processes involves the addition of better and more superior image processing and camera applications , as shown off by the Samsung and LG company in particular. This is one of the main reason why, despite being announced at Mobile World Congress in late February this year, LG’s G5 smart_phone will not be able to ship until April 1st 2016. Sony’s new Xperias are in the same boat, though the Japanese company does not even have an exact date, (aside from "some time this summer") for when you’ll be able to lay your hands on one.

However, for the past 3 years, the well know company Google has released the latest iteration of Android OS in October. This is in Google’s best interests because, as the company endeavors to keep pace with (or keep ahead of, depending on your perspective) Apple’s iOS. New iPhones, replete with new software, typically arrive in the month of  September, and Google’s job is to mainly counter them with a fresh serving of Android operating system right away. Because of the time factor, device manufacturers (OEM) need to mainly capitalize on that latest software, the rhythm that is developed in recent times is that in February’s Mobile World Congress becomes the main focal point for new announcements of new devices, and the weeks immediately after it are the time when all the new Android devices start trickling out. This year 2016, most of them seems to be clustering much around the first week of April 2016, as a coincidence more than a deliberate plan. But if Google schedule continues as it has been going, this might well become a normal and familiar phenomenon to the Android smartphones and devices market.

Google main hardware partners understand that its priority is to mainly compete with the Apple  iOS, and not the iPhone or iPad themselves. Android’s Operating system release pattern makes it hard for them to easily launch hot new flagship devices in time for the holiday shopping period, but at the same time it opens up the opportunity for them to develop a separate hype window in the spring. By this point next month, new smartphone buyers should be feeling overwhelmed by the breadth and depth of choice on offer from new Marshmallow devices as the case may be.

Nevertheless, If you are in the market for a new smartphone or devices, you owe it to yourself to simply wait a couple of weeks to see exactly what everyone as a whole  have in store. More devices to come will  mainly embrace USB-C, LG and Huawei will be trying to convince us that just one camera on the back of a smartphone or device is not enough, and everyone will be pushing the envelope on better and more efficient industrial design as the case may be. Apple is also getting in on this particularly active launch period with the announcement of its cheaper and smaller iPhone SE, but April looks destined to be dominated by a succession of Android launches. You never know, maybe we’ll start referring to April as Android month. It'd make for fun alliteration while articulating the spring's importance as the critical time when all the manufacturers’ pieces start falling into place.


Searches related to April Is The Best Month To Buy Android Phones, Gadgets And Devices | The Best Month To Buy Android Phones, Gadgets And Devices

>>> best time to buy a smartphone 2017
>>> when do smartphone prices drop
>>> best time of year to buy cell phone plan
>>> new smartphones coming soon
>>> the best phone out right now
>>> best smartphone overall
>>> best smartphone 2016
>>> best smartphone 2017

A SEMINAR REPORT ON IRIS RECOGNITION: A TOOL FOR MODERN SECURITY

Posted by with No comments
A SEMINAR REPORT ON IRIS RECOGNITION: A TOOL FOR MODERN SECURITY
A SEMINAR REPORT ON IRIS RECOGNITION: A TOOL FOR MODERN SECURITY


IRIS RECOGNITION: A TOOL FOR MODERN SECURITY



A SEMINAR PRESENTED BY:

N**** L****, I*******

REG. NO.: CS/12/***



SUBMITTED TO:

DEPARTMENT OF COMPUTER SCIENCE

FACULTY OF SCIENCE

MADONNA UNIVERSITY, ELELE CAMPUS, RIVERS STATE




IN PARTIAL FUFILMENT FOR THE REQUIREMENT OF THE AWARD OF BACHELOR OF SCIENCE (B.Sc.) DEGREE IN COMPUTER SCIENCE.




DECEMBER, 2015





DECLARATION



This is to certify that the seminar research on “IRIS RECOGNITION: A TOOL FOR MODERN SECURITY ” was carried out by N**** L**** I*******, with REGISTRATION NUMBER: CS/12/***, has met the condition of Bachelors of science (B.Sc) degree in Computer Science, Madonna University Okija, Elele Campus. It is hereby approved for its contribution to knowledge.



N**** L**** I******* ………….….………..... ......……………………

(Student) Signature Date



MRS C******* I******** ………….………….....… …………......…………

(Supervisor) Signature Date



MRS E******* *** …………......…………… …………………......….

(AG Head of Department) Signature Date




DEDICATION

I dedicate this work to Almighty God for his protection and good health He bestow me throughout the duration of this programme.



ACKNOWLEDGEMENTS

I cannot but make specific references to those people who contributed greatly towards the successful completion of this study.

I wish to acknowledge with gratefulness the special effort of my Supervisor, MRS C******* who contributed greatly to the successful completion of this seminar research. I am grateful for her guidance and assistance, especially her patience in reading and examining thoroughly every aspect of the work in making necessary corrections, an act which fully attests to her academic sagacity.

I also wish to thank all the Computer Science lecturers, especially my AG HOD MRS E******* O**, and all lecturers in the Faculty of Sciences for their blissful contributions towards my academic success. I am also sincerely grateful to my parents MR and MRS.N**** C.U., my brother E**** for their moral, financial and spiritual support.



TABLE OF CONTENTS



TITLE PAGE ………………………………………………………………………………….i

DECLARATION ……………………………………………………………………………..ii

DEDICATION ……………………………………………………………………………….iii

ACKNOWLEDGEMENT …………………………………………………………………...iv

TABLE OF CONTENT ………………………………………………………………………v

ABSTRACT ………………………………………………………………………………...viii

INTRODUCTION …………………………………………………………………………….1

1.1 BACKGROUND OF THE STUDY ……………………………………………….....1

1.2 AIM AND OBJECTIVES OF THE STUDY ………………………………………...2

1.3 SIGNIFICANT OF THE STUDY …………………………………………………….2

1.4 SCOPE OF THE STUDY …………………………………………………………… 2

1.5 LIMITATION OF THE STUDY ……………………………………………………..2

1.7 GLOSSARY …………………………………………………………………………..3

1.6 ORGANIZATION OF THE STUDY ………………………………………………...3

CHAPTER TWO ……………………………………………………………………………...5

LITEREATURE REVIEW …………………………………………………………………...5

2.1 HISTORY OF IRIS RECOGNITION …………………………………………….......5

2.2 RELATED WORK …………………………………………………………………...5

CHAPTER THREE …………………………………………………………………………...7

WHAT IS IRIS RECOGNITION …………………………………………………………….7

3.1 IRIS RECOGNITION ………………………………………………………………...7

3.2 IRIS CHARACTERISTICS …………………………………………………………..7

3.2.1 Iris characteristics that make it appealing for authentication are: …………………….8

3.3 WHY IRIS??? ………………………………………………………………………...8

3.4 COMPARISON WITH OTHERS BIOMETRIC SYSTEM ………………………….9

3.4.1 IRIS RECOGNITION vs FACIAL RECOGNITION ………………………………...9

3.4.2 IRIS RECOGNITION vs FINGERPRINT …………………………………………...9

3.4.3 IRIS RECOGNITION vs RETINA RECOGNITION ………………………………..9





3.4.4 IRIS RECOGNITION vs HAND GEOMETRY …………………………………….10

3.5 ARCHITECTURE OF IRIS RECOGNITION ……………………………………...10

3.6 DEVICES USED FOR IRIS RECOGNITION ……………………………………...11

3.6.1 Characteristics of the Iris Recognition Devices are; ………………………………...12

3.7 COMPONENT OF IRIS RECOGNITION ………………………………………….12

3.7.1 IMAGE PREPROCESSING: ………………………………………………………..12

Iris Localization: …………………………………………………………………………….12

Iris Normalization: …………………………………………………………………………..13

3.7.2 FEATURES EXTRACTION ………………………………………………………..13

3.7.3 PATTERN MATCHING ……………………………………………………………13

3.8 HOW IRIS RECOGNITION WORKS ……………………………………………..13

3.8.1 CAPTURING THE IMAGE: ………………………………………………………..14

3.8.2 DEFINING THE LOCATION OF THE IRIS AND OPTIMISING THE IMAGE …14

3.8.3 STORING AND COMPARING THE IMAGE ……………………………………..15

3.9 APPLICATION AREA ……………………………………………………………...17

3.9.1 ATM’S AND IRIS RECOGNITION: ……………………………………………….17

3.9.2 TRACKING PRISONER MOVEMENT ……………………………………………17

3.9.3 NATIONAL BORDER CONTROLS USING IRIS RECOGNITION ……………...18

3.10 ADVANTAGES OF IRIS RECOGNITION ………………………………………...19

3.11 DISADVANTAGES OF IRIS RECOGNITION ……………………………………19

CHAPTER FOUR …………………………………………………………………………...21

SUMMARY, CONCLUSION AND RECOMMENDATION ……………………………...21

4.1 SUMMARY …………………………………………………………………………21

4.2 CONCLUSION ……………………………………………………………………...21

4.3 RECOMMENDATION ……………………………………………………………..22

REFERENCE ………………………………………………………………………………..23




ABSTRACT

Iris recognition is a biometric technology for identifying humans by capturing and analysing the unique patterns of the iris in the human eye. A biometric system provides automatic identification of an individual based on a unique feature or characteristic possessed by the individual. Unlike other biometric such as fingerprints and face recognition, the distinct aspect of iris comes from randomly distributed features. Iris recognition is regarded as the most reliable and accurate biometric identification system available. This seminar work shows how Iris recognition work, its comparison with other biometric device and some of its application areas such as Automated Teller Machine (ATM), Tracking Prisoner Movement, National Border Control, Ticketless air travel and Premises access control. Finally, some advantages include protection, speed, accuracy, scalability and stability, and some disadvantages are blindness, infection, and expensive equipment etc. In conclusion, it provides an accurate and secure method of authenticating users onto company systems.




CHAPTER ONE
INTRODUCTION


1.1 BACKGROUND OF STUDY

In today’s information technology world, security for systems is becoming more and more important. The number of systems that have been compromised is ever increasing and authentication plays a major role as a first line of defence against intruders. The three main types of authentication are something you know (such as a password), something you have (such as a card or token), and something you are (biometric). Passwords are notorious for being weak and easily crackable due to human nature and our tendency to make passwords easy to remember or writing them down somewhere easily accessible. Cards and tokens can be presented by anyone and although the token or card is recognizable, there is no way of knowing if the person presenting the card is the actual owner. Biometrics, on the other hand, provides a secure method of authentication and identification, as they are difficult to replicate and steal.

Iris recognition is a biometric technology for identifying humans by capturing and analyzing the unique patterns of the iris in the human eye. Iris recognition can be used in a wide range of applications in which a person’s identity must be established or confirmed. For example, these include passport control, border control, frequent flyer service, premises entry, access to privilege information, computer login or any other transaction in which personal identification and authentication relies on knowledge-based or token-based passwords. Nevertheless, one of the most dangerous security threats in today’s world is impersonation, in which somebody claims to be someone else. Through impersonation, a high-risk security area can be at risk. An unauthorized person may get access to confidential data or important documents can be stolen. Normally, impersonation is tackled by identification and secure authentication, however, the traditional knowledge-based (password) or possession-based (ID, Smart Card) methods are not sufficient since they can be easily hacked or compromised. Hence, there is an essential need for personal characteristics-based (biometric) identification due to the fact that it can provide the highest protection against impersonation. 


1.2 PROBLEM STATEMENT 

Due to increased rate of crime, inaccuracy, unreliability, inadequacy of other biometric techniques and the use of weak password which can be easily cracked, the quest for strong authentication is needed and that is where Iris Recognition comes in.


1.3 OBJECTIVES OF STUDY

This seminar topic is generally conducted to understand Iris Recognition, a tool for modern security. Other specific objectives include;

· To analyze the impact of Iris recognition in checkmating impersonation.

· To Compare Iris Recognition with others biometric system

· To examine the possibility of using Iris Recognition in curtailing crime.


1.4 SIGNIFICANT OF STUDY

This seminar presentation is significant in several aspects. Apart from being a necessary condition in Madonna University, it is also an opportunity for the researcher to conduct an independent study based on empirical data.

Furthermore, it will help to advance knowledge and hence, be of great value to other researchers taking computer science as a course and researching on related issues and to members of the academic in general.

Finally recommendations made in this study will serve as possible solutions to appropriate agencies in adopting Iris Recognition in curtailing crimes and impersonation.

1.5 SCOPE OF STUDY

The scope of the study was restricted to Iris Recognition, it will focus on Iris Rsecognition as a biometric technology, and comparison with other biometric technology such as Finger Print, Hand Geometry, Facial Recognition and Retina Recognition etc.


1.6 LIMITATION OF STUDY

This study is designed specifically to examine Iris Recognition, a tool for modern security, hence because of research constraints such as time which is of essence and no researcher have the luxury of it all and finance that is usually inadequate and limited at the disposal of researcher.


1.7 GLOSSARY

· BIOMETRICS: biometrics, refers to the automatic recognition of individuals based on their physiological and/or behavioural characteristics (Vijay Dhir et al, 2010)

· IRIS: Iris is a coloured oval-to round-shaped ring surrounding the pupil of the eye. It consists of muscles that adjust the size of the pupil (Vijay Dhir et al, 2010).

· RECOGNITION: is used as a form of identification and access control.

· AUTHENTICATION: A process by which subjects, normally users, establish their identity to a system. This may be affected by the use of a password or possession of a physical device (Elgamal, 2013).

· ENROLLMENT: The process of adding a user’s credentials to the authentication system. 

· VERIFICATION: A one to one comparison of a captured biometric with a stored template to verify that the individual is who he claims to be. Can be done in conjunction with a smart card, username or ID number. (Vijay Dhir et al, 2010)

· IDENTIFICATION: A one to many comparisons of the captured biometric against a biometric database in attempt to identify an unknown individual. The identification only succeeds in identifying the individual if the comparison of the biometric sample to a template in the database falls within a previously set threshold (Vijay Dhir et al, 2010).



1.6 ORGANIZATION OF STUDY

For systematic presentation, this work is planned in four chapters. Each chapter deals with a particular aspect or segment of the work.

CHAPTER ONE starts by introducing the topic, which gives an insight and in-depth analysis of the seminar work, which was closely followed by the objectives of the topic, which gave rise to the significance of the topic, followed by the limitation, scope and crowned by the organization of the topic.

CHAPTER TWO deals with the historical background of the topic and followed by the definition of terms of the topic.

CHAPTER THREE focuses on the discussion of the topic, which was closely followed by what is Iris Recognition, Architecture of Iris Recognition, Component of Iris Recognition, how Iris Recognition is a tool for modern security work, the Application of Iris Recognition in modern technology which is followed by the Positive Effect and Negative Effect of Iris Recognition.

Finally, CHAPTER FOUR summaries the topic, enumerate conclusion and proffers recommendation for the topic and the way forward.



CHAPTER TWO
LITERATURE REVIEW


2.1 HISTORY OF IRIS RECOGNITION

The iris recognition technology captures and analyzes the unique features of iris in the human eye to perform identification. In 1936, ophthalmologist Frank Burch proposed the concept of using iris patterns as a method to recognize an individual, the idea appeared in James Bond films, but it still remained science fiction and conjecture. The first claim that no two irises are identical was made by Dr. Leonard Flom and Dr. Aran Safir, both ophthalmologists in mid 1980s. The claim was based on their clinical research that every iris is different and was seen to remain unchanged in clinical photographs. This claim made the human iris as a good candidate for a biometric solution and after substantial research the patent of using iris as a means for identifying persons was awarded to them in 1987. Dr. Flom approached Harvard Professor Dr. John Daugman to develop an algorithm to automate identification of the human iris. Later in 1989 Dr. John Daugman developed algorithms for recognizing persons by iris recognition. In 1993, the Defense Nuclear Agency began work to test and deliver a prototype unit, which was successfully completed by 1995 due to the combined efforts of Drs. Flom, Safir, and Daugman. In 1994, Dr. Daugman was awarded a patent for his automated iris recognition algorithms. In 1995, the first commercial products became available.


2.2 RELATED WORK

According to his introduction, (Elgamal, 2013) Automatic reliable personnel identification systems using biometrics have received a great importance in the past few years. Biometrics refers to a science of analyzing human physiological or behavioural characteristics for security purposes. Biometric technologies are being utilized across a variety of applications. There are many biometric technologies which commonly be used in government, forensics and commercial area (Ross, 2004) such as iris recognition, fingerprints, hand geometry, and DNA (Ghatol, 2007). 

According to Masek (2003), the iris is a thin color circular diaphragm, which can be found between the cornea and the lens of the human eye and close to the pupil. Position of the iris is bounded by the pupil and the sclera (white of the eye) on their surroundings. Iris has much visual information in the texture (Murty, Reddy, and Babu, 2009). 

The pattern of iris forms from the third month of gestation and complete these pattern structures in five months, and their pigment accretion can continue until two(2) years old age (Daugman, 2001). In iris recognition there is no change in iris features during a person’s lifetime after two(2) years old age and size of iris can be varying from 10% to 80% with the average diameter is 12mm (Daugman, 2001).

In 1936, ophthalmologist Frank Burch proposed iris pattern for personal recognition. Then in 1987 two ophthalmologists, Aran Safir and Leonard Flom, patented this idea, and they ask John Daugman to create algorithms for iris recognition in 1989 (Daugman, 2001).

Iris provides one of the most stable biometric signals for identification, with a distinctive texture that is formed before age one and remains constant throughout life unless there is an injury to the eye (Ives, 2004). Iris recognition can easily be considered as the most reliable form of biometric technology, compared with other biometric technologies, such as face, and fingerprint recognition (Nasser A. Biqami, 2013).

Most of the currently deployed commercial algorithms for iris recognition (by John Daugman) have a very low false acceptance rate compared to the other biometric identifiers.

Some of the biometric identifiers have problems with replay attacks, for instance fingerprints. Replay attacks with the iris biometric can be check by detecting the aliveness of the eye. The pupil changes its size when light is shone into the eye. The algorithms are able to measure this change in pupil size. The process of capturing the iris image is not intrusive. Iris images can be computer matched more accurately than a face image, and it’s acknowledged that iris recognition is more accurate than any other biometric technique.

According to (Rishabh and Sandeep J. 2012), Iris recognition is considered to be most secure biometric approach as it is non-invasive and stable throughout life. For the purpose of research and development of Iris recognition technology there are few public and freely available databases to have sample images. These iris databases contributes rich amount of iris images which were taken in different environments. In this paper they discuss and compare the main characteristics of the public and freely available iris image databases to find the suitable one to test feature extraction method of iris recognition in non-cooperative environment.





CHAPTER THREE
FINDINGS

3.1 IRIS RECOGNITION

Iris recognition is a type of pattern recognition of a person’s iris recorded in a database for future attempts to determine or recognize a person’s identity when the eye is viewed by a reader. The iris usually has a brown, blue, gray, or greenish color, with complex patterns that are visible upon close inspection. Because it makes use of a biological characteristic, iris recognition is considered a form of biometric verification

Iris recognition combines computer vision, pattern recognition, statistics, and the human machine interface.


3.2 IRIS CHARACTERISTICS

The human iris is a coloured oval – to round-shaped ring surrounding the pupil of the eye. Figure 1 shows a sample iris, it consists of muscles that adjust the size of the pupil. The iris is the only internal body organ that is visible externally. One of the most distinctive characteristics is its stability. The iris pattern stabilizes by the second year of birth and remains unchanged throughout person’s lifetime unless injured or damaged by accident or disease.

The Human Iris ( Hussein H. Fakhry and Benedict B. Cardozo, 2006) Figure 1: The Human Iris

( Hussein H. Fakhry and Benedict B. Cardozo, 2006)
Figure 1: The Human Iris


3.2.1 Iris characteristics that make it appealing for authentication are:

The iris pattern is more complex and more random than other biometric patterns and hence offer a highly precise methods for individual authentication with a false acceptance error rate of less than one in two million records.

The iris located in the human eye is protected behind the eyelid, cornea and aqueous. This helps it to keep the damage and abrasion minimal. In addition it is nearly impossible to forge identity.

The iris pattern remains stable and unchanged after the age of two year and does not degrade over time or with the environment.

The probability of two irises producing the same numerical code is almost zero.

A distinctive iris pattern is not liable to theft, loss or compromise.

Each iris is different, even between identical twins or between left and right iris of an individual.

Since the iris is an extremely complex structure, modification of the iris would require sophisticated intricate microsurgery. This could result in individual loss of sight or an obvious artificiality that can be easily seen visually.


3.3 WHY IRIS?

Research shows the iris is one of the most unique data rich physical structures on the human body. An iris has 256 independent measurable characteristics, or degrees of freedom, nearly six times as many as a finger print. Thus, the probability of two irises producing the same code is approximately 1 in 1078. , With the population of the earth being approximately 1010 people. 

Thus, the performance of iris recognition is at a much higher level of scientific certainty and has many greater capabilities than any other form of Human recognition, including finger prints, Facial or voice recognition, and retinal recognition. This recognition technology is relatively new with many significant advantages, such as speed, accuracy, hardware, simplicity, and applicability.

Accurately identifying individuals is a major concern for governmental agencies, police department, medical institutions, banking and legal institutions, and corporation, to name just a few. The importance lies in the necessity for the control of fraud, competence in administration, and benefits to users of various systems.


3.4 COMPARISON WITH OTHERS BIOMETRIC SYSTEM
3.4.1 IRIS RECOGNITION vs FACIAL RECOGNITION

· Lighting, age, glasses, and head/face coverings all impact false reject rates in facial recognition whereas iris recognition poses no difficulty in enrolling people that wear glasses or contact lenses.

· Face recognition has Privacy concerns: people do not always know when their picture/image is being taken and being searched in a database or worse, being enrolled in a database whereas in Iris Recognition subjects agree to enroll and participate, reducing privacy concerns.

· Iris recognition is more reliable than facial recognition.


3.4.2 IRIS RECOGNITION vs FINGERPRINT

· Based on occupation, trauma or disease, individual fingerprints may be obscured, damaged or changed meaning some people may need to enroll multiple times over the course of their lives. Fingerprint readability also may be affected by the work an individual does. For example, transportation workers such as mechanics, food workers, or maintenance workers may present fingerprints that are difficult to read due to dryness or the presence of foreign substances, such as oil or dirt, on fingers.

· But fingerprint is not as accurate as iris recognition. Fingerprint false accept rate varies by Vendor, and is approximately 1 in 100,000. Whereas Iris recognition false accept rate is 1 in 1.2 million statistically.

· Iris recognition can perform 1: all matches in a high speed environment, whereas fingerprint searches take much longer, may require filtering, and may return multiple candidate matches.


3.4.3 IRIS RECOGNITION vs RETINA RECOGNITION

· The error rate for retinal scanning is 1:10,000,000 compared to the iris recognition error rate of 1:131,000.

· People wearing glasses must remove them for a retinal scan. For iris recognition, the National Physical Laboratory (NPL) tests found that glasses can make enrolment more difficult, but they can remain in place for verification without causing difficulty.

3.4.4 IRIS RECOGNITION vs HAND GEOMETRY

· Hand size and geometry changes over time, especially in the very young and the very old whereas the iris itself is stable throughout a person’s life (approximately from the age of one); the physical characteristics of the iris don't change with age.

· People are reluctant to place hand where many others have touched so hygiene is another issue with hand geometry, whereas in iris recognition there is no physical contact of person with camera.

· Also extreme sizes are not accommodated in all hand readers.


3.5 ARCHITECTURE OF IRIS RECOGNITION

The block diagram in Figure 2 depicts the principle steps of the proposed iris recognition system and is described in the following. The system has two sub–systems: the iris enrolment system and the iris verification system. The iris enrolment system is to enrol the iris in the database for further identification. The iris verification system compares a newly input iris with the known irises in the database and decides if it is in the database.

The iris enrolment system is comprised of the following modules: The image acquisition module, the Pre-processing Module, the feature extraction module, the Enrolment Module, and the Iris Pattern Database. The iris verification system does not have the Enrolment Module, but has two additional modules: pattern matching module and the Identification Module.

Iris Recognition System ( Yingzi Du and Ives Robert, 2004) Figure 2: Iris Recognition System

( Yingzi Du and Ives Robert, 2004)
Figure 2: Iris Recognition System


3.6 DEVICES USED FOR IRIS RECOGNITION

devices used for iris recognition
devices used for iris recognition


3.6.1 Characteristics of the Iris Recognition Devices are;

· HARMLESS: - Acquiring your iris image through the optical units is completely safe. Capturing the iris image is just like taking a picture.

· CONVENIENT OPERATION: - You just enrol your iris for registration and recognition. The identification process can be performed perfectly, regardless of wearing eyeglasses, most sunglasses, or soft contact lenses.

· ACCURACY: - Iris recognition is based on the most mathematically unique biometric – the iris of the eye. The human iris is unique, even between twins or an individual’s right and left eyes. 

· SCALABILITY: - This can handle sizable database entries and there is not any negative impact on the accuracy as the database size increase.

· SPEEDY IDENTIFICATION: - Identification can be made within 1 to 2 seconds.


3.7 COMPONENT OF IRIS RECOGNITION

The iris recognition consisted of three major components: Image Pre-processing, Feature Extraction and Pattern matching.

3.7.1 IMAGE PREPROCESSING:

The acquired image always contains not only the “useful” parts (IRIS) but also some “relevant” parts (e.g. eyelid, pupil). Under some conditions, the brightness is not uniformly distributed. In addition, different eye-to-camera distance may result in different image sizes of the same eye. For the purpose of analysis, the original image needs to be processed. The processing is composed of two steps which are Iris Localization and Iris Normalization.

Iris Localization: Iris localization by definition means to isolate the actual iris region in a digital eye image by detecting the inner and outer boundary of the iris. Figure 3 shows the Iris Localization. The eyelids and eyelashes normally occlude the upper and lower parts of the iris region. A technique is required to isolate and exclude these artefacts as well as locating the circular iris region. The aim of this is to detect the iris portion which can be approximated by two circles, one is the iris/sclera (outer) boundary, and another interior to the first is the iris/pupil (inner) boundary. Iris Localization is done by the process of Iris segmentation which localizes the correct iris region in an eye image. Iris segmentation is an essential in automated iris processing systems, because it is the basis for any further operations. 

Localization of Iris  ( P. Ramamoorthy and R.Krishnamoorthy, 2012) Figure 3: Localization of Iris

( P. Ramamoorthy and R.Krishnamoorthy, 2012)
Figure 3: Localization of Iris


Iris Normalization: 

Once the iris region is segmented, the next stage is to normalize this part so as to enable the generation of the iris-code and their comparisons. Since the variations in the eye, like optical size of the iris, position of pupil in the iris, and the iris orientation change from person to person, it is required to normalize the iris image so that the representation is common to all, with similar dimensions. The normalization process involves un-wrapping the iris and converting it into its polar equivalent.

3.7.2 FEATURES EXTRACTION 

The extraction of iris features means capturing ring-shape patterns around the iris area. After capturing the eye image, the iris area should be correctly extracted from it. Detecting the inner boundary of the iris against the pupil and the outer border of the iris against the sclera finishes the process.

3.7.3 PATTERN MATCHING 

After iris localization, the final step is pattern matching of the iris image which generates a match score by comparing the feature sets of two iris images. One technique for comparing two Iris-Codes is to use the Hamming distance, which is the number of corresponding bits that differ between the two Iris-Codes. The iris pattern is different for every person (even identical twins don’t have the same iris pattern). These patterns are used to create templates for iris recognition. The acquired image is matched with the whole database of templates.


3.8 HOW IRIS RECOGNITION WORKS

The process of capturing an iris into a biometric template is made up of 3 steps:

1. Capturing the image

2. Defining the location of the iris and optimising the image

3. Storing and comparing the image.


3.8.1 CAPTURING THE IMAGE:

The image of the iris can be captured using a standard camera using both visible and infrared light and may be either a manual or automated procedure (Figure 4). The camera can be positioned between three and a half inches and one meter to capture the image. In the manual procedure, the user needs to adjust the camera to get the iris in focus and needs to be within six to twelve inches of the camera. This process is much more manually intensive and requires proper user training to be successful. The automatic procedure uses a set of cameras that locate the face and iris automatically thus making this process much more user friendly.

An Iris-Scan model 2100 iris scanner (Penny Khaw, 2002) Figure 4: An Iris-Scan model 2100 iris scanner


(Penny Khaw, 2002)
Figure 4: An Iris-Scan model 2100 iris scanner


3.8.2 DEFINING THE LOCATION OF THE IRIS AND OPTIMISING THE IMAGE

Once the camera has located the eye, the iris recognition system then identifies the image that has the best focus and clarity of the iris (Figure 5). The image is then analysed to identify the outer boundary of the iris where it meets the white sclera of the eye, the pupillary boundary and the centre of the pupil. This results in the precise location of the circular iris.

Circular Iris Location (Penny Khaw, 2002) Figure 5: Circular Iris Location

(Penny Khaw, 2002)
Figure 5: Circular Iris Location

The iris recognition system then identifies the areas of the iris image that are suitable for feature extraction and analysis. This involves removing areas that are covered by the eyelids, any deep shadows and reflective areas. The following diagram (Figure 6) shows the optimisation of the image.

(Penny Khaw, 2002) Figure 6: Optimizing the image

(Penny Khaw, 2002)
Figure 6: Optimizing the image

3.8.3 STORING AND COMPARING THE IMAGE

Once the image has been captured, “an algorithm uses 2-D Gabor wavelets to filter and map segments of the iris into hundreds of vectors (known here as phasors). The 2-D Gabor phasor is simply the “what” and “where” of the image. Even after applying the algorithms to the iris image there are still 173 degrees of freedom to identify the iris. These algorithms also take into account the changes that can occur with an iris, for example the pupil’s expansion and contraction in response to light will stretch and skew the iris. This information is used to produce what is known as the Iris-Code, which is a 512-byte record. This record is then stored in a database for future comparison. When a comparison is required the same process is followed but instead of storing the record it is compared to all the Iris-Code records stored in the database. The comparison also doesn’t actually compare the image of the iris but rather compares the hexadecimal value produced after the algorithms have been applied.
In order to compare the stored Iris-Code record with an image just scanned, a calculation of the Hamming Distance is required. The Hamming Distance is a measure of the variation between the Iris-Code record for the current iris and the Iris-Code records stored in the database. Each of the 2048 bits is compared against each other, i.e. bit 1 from the current Iris-Code and bit 1 from the stored Iris-Code record are compared, then bit 2 and so on. Any bits that don’t match are assigned a value of one and bits that do match a value of zero. Once all the bits have been compared, the number of non-matching bits is divided by the total number of bits to produce a two-digit figure of how the two Iris-Code records differ. For example a Hamming Distance of 0.20 means that the two Iris-Codes differ by 20%.



Iris Recognition Process

Iris Recognition Process (Penny Khaw, 2002) Figure 7: Iris Recognition Process


(Penny Khaw, 2002)
Figure 7: Iris Recognition Process

Figure 7 summarizes the steps to be followed when doing iris recognition.

Step 1: Image acquisition, the first phase, is one of the major challenges of automated iris recognition since we need to capture a high-quality image of the iris while remaining non-invasive to the human operator.

Step 2: Iris localization takes place to detect the edge of the iris as well as that of the pupil; thus extracting the iris region.

Step 3: Normalization is used to be able to transform the iris region to have fixed dimensions, and hence removing the dimensional inconsistencies between eye images due to the stretching of the iris caused by the pupil dilation from varying levels of illumination.

Step 4: The normalized iris region is unwrapped into a rectangular region.

Step 5: Finally, it is time to extract the most discriminating feature in the iris pattern so that a comparison between templates can be done. Therefore, the obtained iris region is encoded using wavelets to construct the iris code.
As a result, a decision can be made in the matching step.

3.9 APPLICATION AREA

Iris recognition systems are being used today to control physical access, to facilitate identity verification and for computer authentication. Real world iris recognition applications have been implemented for airport and prison security, automatic teller machines (ATM), authentication using single sign-on, to replace ID cards, and to secure school and hospitals.
Application of iris recognition technology can he limited only by imagination. The important applications are the following:

3.9.1 ATM’S AND IRIS RECOGNITION: 

In U.S many banks incorporated iris recognition technology into ATM’s for the purpose of controlling access to one’s bank accounts. After enrolling once (a “30 second” process), the customer need only approach the ATM, follow the instruction to look at the camera, and be recognized within 2-4 seconds. The benefits of such a system are that the customer who chooses to use bank’s ATM with iris recognition will have a quicker, more secure transaction.
ATM’s and Iris Recognition (Arun Ross, 2010)
(Arun Ross, 2010)
Figure 8: ATM’s and Iris Recognition


3.9.2 TRACKING PRISONER MOVEMENT

The exceptionally high levels of accuracy provided by iris recognition technology broadens its applicability in high risk, high-security installations. Iris scan has implemented their devices with great success in prisons in Pennsylvania and Florida. By this any prison transfer or release is authorized through biometric identification. Such devices greatly ease logistical and staffing problems.
Applications of this type are well suited to iris recognition technology. First, being fairly large, iris recognition physical security devices are easily integrated into the mountable, sturdy apparatuses needed or access control, the technology’s phenomenal accuracy can be relied upon to prevent unauthorized release or transfer and to identify repeat offenders re-entering prison under a different identity.
Iris Recognition used in Prison  ( Hussein H. Fakhry and Benedict B. Cardozo, 2006)

( Hussein H. Fakhry and Benedict B. Cardozo, 2006)
Figure 9: Iris Recognition used in Prison


3.9.3 NATIONAL BORDER CONTROLS USING IRIS RECOGNITION

Iris scan has implemented their devices with great success in borders in Mexico and USA border. By this any person going to USA from Mexico is authorized through biometric identification. Such devices greatly ease logistical and staffing problems.

Iris Recognition used in Border ( Hussein H. Fakhry and Benedict B. Cardozo, 2006)
( Hussein H. Fakhry and Benedict B. Cardozo, 2006)
Figure 10: Iris Recognition used in Border



There are also used in the following areas:

Computer login: The iris as a living password.

Ticket less air travel.

Premises access control (home, office, laboratory etc.).

Driving licenses and other personal certificates.

Entitlements and benefits authentication.

Forensics, birth certificates, tracking missing or wanted person 

Credit-card authentication.

Automobile ignition and unlocking; anti-theft devices.

Secure financial transaction (e-commerce, banking).

Internet security, control of access to privileged information. 

automobile ignition and unlocking; anti-theft devices 

secure access to bank accounts at cash machines 

 Internet security; control of access to privileged information


3.10 ADVANTAGES OF IRIS RECOGNITION

1. Highly protected, internal organ of the eye. A person’s iris is fully developed within 18 months after birth, and is protected by eyelashes, eyelids and the retina. This distinguishes it from fingerprints, which can be difficult to recognize after years of certain types of manual labour.

2. Externally visible pattern imaged from a distance

3. Patterns apparently stable throughout life

4. Iris shape is far more predictable than that of the face

5. No need for a person to touch any equipment

6. Its higher uniqueness in shape than face or fingerprints ensures that an authentication system using the iris is immensely reliable.

7. Iris recognition is proven the highest accuracy in biometrics. Iris recognition had no false matches

8. Iris patterns possess a high degree of randomness. Randomness in irises makes them very difficult to forge and hence imitate the actual person.

9. Scalability and speed of the technology are a major advantage.

10. Encoding and decision-making are tractable

11. Image analysis and encoding time: 1second

12. Search speed: 100000 Iris Codes per second


3.11 DISADVANTAGES OF IRIS RECOGNITION

1. Localization fails for dark iris

2. Highly prone for changes in weather or due to infection

3. The iris is a very small organ to scan from a distance. It can be obscured by eyelashes, lenses, reflections. Subjects who are blind or cataracts can also pose a challenge to iris recognition, as there is difficulty in reading the iris.

4. Equipment for scanning is expensive

5. Iris recognition is very difficult to perform at a distance larger than a few meters and if the person to be identified is not cooperating by holding the head still and looking into the camera.




CHAPTER FOUR
SUMMARY AND CONCLUSION

4.1 SUMMARY

The focus of this seminar research is on “Iris Recognition: A tool for modern security”. The study is justified for the simple reason that the Iris Recognition is an indispensable biometric for the growth of security in the world. To facilitate the attainment of the objectives of this study, the study was organized into four chapters. Chapter One involves the introduction, statement of the problems which consequently originated the study objectives. Accordingly, Chapter Two unravelled the theoretical framework for the study, while Chapter Three enumerated the Architecture of the study, component of the study, how it works the Application Area, Advantage and Disadvantage. The last chapter, being the fourth summarized, concluded and proffer recommendations.

4.2 CONCLUSION

The need for secure methods of authentication is becoming increasingly important in the corporate world today. Passwords, token cards and PINs are all risks to the security of an organisation due to human nature. Our inability to remember complex passwords and tendency to write these down along with losing token cards or forgetting PINs all contribute to the possible breakdown in security for an organisation.
The uniqueness of the iris and low probability of a false acceptance or false rejection all contribute to the benefits of using iris recognition technology. It provides an accurate and secure method of authenticating users onto company systems, is a non-intrusive method and has the speed required to minimise user frustration when accessing company systems. Users no longer have to worry about remembering passwords and system administrators no longer need to worry about the never-ending problem of users disclosing passwords or having weak passwords that are easily cracked. If a two-factor authentication system is implemented, for example iris recognition with a smart card, then the strength of authentication increases and provides another part to “defence in depth” for the company.



4.3 RECOMMENDATION

The following recommendation are general in scope and are intended for those institutions, security directors or managers of building, and homeland security experts with interest in access control devices.


· The effectiveness of Iris recognition as a physical access control measure can be improved by taking into account the architecture features of its environment. Police, Security experts and Criminologists have been aware of the role that the physical environment can play in security, crime and violence.

· Iris Recognition and / or appropriate housing devices should be develop and installed to protect against outdoor invaders or intruders.

· Overall, we found that Iris recognition technology can potentially be an effective way to control access during working hour if coupled with other less expensive and more frequently used security measures.

· If Iris Recognition technology is used in institution we recommend that institutions administrators and security personnel pay close attention to track and to include policies that will prevent doors from being propped open or unlock

· Iris Recognition can significantly reduce the work of front office staff if it is complemented by software designed to automatically print labels for each incoming visitor.




REFERENCES

Arun, R. (2010). Iris Recognition: The path forward. IEEE Computer Society, PP6-7.

Daugman, J. (2001). The Importance of Being Random: Statistical Principles of Iris Recognition. International Journal of Wavelet, Multi-resolution and Information Processing, PP3-6.

Daugman, J. and Downing, C. (2001). Epigenetic Randomness, Complexity and Singularity of Human Iris Patterns. Proceedings of the Royal Society: Biological Science, PP1737-1738.

Elgamal, M. (2013). An Efficient Feature Extraction Method for Iris Recognition Based on Wavelet Transformation. International Journal of Wavelets, Multi-resolution and Information Processing, PP10-11.

Ghatol, G. A. (2007). An Efficient Feature Extraction Method for Iris Recognition Based on Wavelet Transformation. Laser Focus World, PP64-65.

Hussein, H. and Benedict, B. (2006). Research and Development of an Iris-Based Recognition System for Identification and Secure Authentication. Information and Security, PP39-57.

Ives, Y. D. (2004). A New Approach to Iris Pattern Recognition. Boca Raton: FL: CRC Press.

John, D. (2003). The Importance of Being Random: Statistical Principles of Iris Recognition. Pattern Recogntion, PP1-17.

Penny, K. (2002). Iris Recognition Technology for Improved Authentication. SANS Institute, InfoSec Reading Room, P6.

Ramamoorthy, P. and Krishnamoorthy, R. (2012). Effective Iris Recognition For Security Enhancement. International Journal of Engineering Research and Applications (IJERA), PP1016-1019.

Ross, J. E. (2004). Effects of Segmentation Routine and Acquisition Environment on Iris Recognition. P1.

Vijay, D. et al. (2010). Bionmetric Recognition: A Modern Era for Security. International Journal of Engineering Science and Technology, P3364.

Yingzi, D. and Ives, R. (2004). A New Approach to Iris Pattern Recognition. SPIE Security and Defence, PP3-5.


Searches related to A SEMINAR REPORT ON IRIS RECOGNITION: A TOOL FOR MODERN SECURITY

>>> iris scanning seminar abstract
>>> iris scanning pdf
>>> applications of iris recognition
>>> iris recognition technology
>>> iris recognition ppt
>>> iris recognition project
>>> iris technology
>>> iris scanner