A Touch Detection Device and Its Limits

Do you need this or any other assignment done for you from scratch?
We have qualified writers to help you.
We assure you a quality paper that is 100% free from plagiarism and AI.
You can choose either format of your choice ( Apa, Mla, Havard, Chicago, or any other)

NB: We do not resell your papers. Upon ordering, we do an original paper exclusively for you.

NB: All your data is kept safe from the public.

Click Here To Order Now!

Introduction: A Touching Device as a Perfect Means of Security

There can be no possible doubts that touch detection device s have become quite popular over the past few years. A true breakthrough in the sphere of science, they mean that the art of taking prints have developed to a new quality level, and that the security has become tighter than ever, which opens a whole new range of possibilities. Taking a closer look at the issue, one can find certain problems, though.

The Research Question: Putting Your Finger on It

Despite the fact that the solution for the problem of hiding access to important data seems solved so far, the question whether the system is efficient enough rises. Indeed, compared to the typical procedure of fingerprint taking, the electronic identification of the fingerprints can presuppose dealing with certain complexities.

For instance, a scratch on the finger can cause the access denial and, vice versa, creating a 3D copy of the finger pattern can help a thief steal the information.

Literature Review: Everything One Ever Needed to Know about Touch Detection

For the given research, the data concerning both the devices and the way sensory detection in human body works have been collected.

Chen, Y.-L., et al. (2011). Vision-based finger detection, tracking and event identification techniques for multi-touch sensing and display systems. Sensors, 11, 6868-6892.

The paper allows to understand the way in which the touch detection device technique works. Offering technical details, it makes a perfect source from checking the possibilities of a system failing.

Dember, W. (1990). William James on sensation and perception. Psychological Science, 1(3), 163-166.

Making the readers consider the issue form a biological standpoint, Dember helps to compare the process of biological recognition to the digital one.

Johansson, R. S., & Vallbo, A. B. (1979). Detection of tactile stimuli. Threshold of afferent units related to psychophysical thresholds in the human hand. Journal of Physiology, 297, 405-422.

Another perspective on the biological aspect of the problem, the article allows to research the limits of a human perception and sensation.

Theoretical Framework: A Solid Backup for the Solutions

The given paper is going to be based on the signal detection theory.

Methodology: Adding the Final Touches to the Plan

It is essential to add that the research is going to be based on the quantitative method. The more cases of fingerprints matching or, on the contrary, the cases of failing the touch test, are going to be examined, the more valuable the answer is going to be.

Research Design and Method: Pick the Investigation Technique

Speaking of more detailed description of the research stages, the project is going to be split into picking the required sources for the theoretical framework, then the fingerprint data collection, which is then followed by a detailed analysis. Finally, a conclusion will be offered.

Concerning Ethics: When Fingerprints Can Tell a Lot

No matter how weird it may sound, the given research can also face certain ethical issues. For instance, since the issue in question is taking fingerprints and analyzing the efficiency of the process, it is logical to ask whether the participants should consider it an intrusion into their personal life.

Thus, it is crucial to obtain the agreement of every single person participating in the research. In addition, the given material can be available for the people who are actually about to cheat on a Touch Detection device.

Communicating the Results: The Means to Convey the Message

When delivering the results, it is necessary to keep in mind that the research does have its limitations and certain boundaries; thus, the research results are to be interpreted as rather general than specific. It can be suggested that the results of the given research can be used as a means to enhance the existing security system even better. However, the paper deals with the common instances, which makes the solution rather general.

Timeline: Everything Goes According to the Schedule

It can be suggested that the entire research should be split into certain stages, which will allow a more accurate collection of data and its more precise evaluation. First, it still be necessary to deal with the references and search for the appropriate sources. Then, the collection of the data comes. Finally, the data is assessed and interpreted and the solution is offered. Therefore, the research is going to take about a week.

The Research Budget: In Terms of the Money Policy

As for the money that the given research is going to need, I believe that the funds are not going to be too high. However, it is worth keeping in mind that a real touch detection device is going to be required for the given project. Therefore, it can be suggested that the project is going to require some $100. However, if buying a second-hand device, one can possibly save about $30.

Reference List

Chen, Y.-L., et al. (2011). Vision-based finger detection, tracking and event identification techniques for multi-touch sensing and display systems. Sensors, 11, 6868-6892.

Dember, W. (1990). William James on sensation and perception. Psychological Science, 1(3), 163-166.

Johansson, R. S., & Vallbo, A. B. (1979). Detection of tactile stimuli. Threshold of afferent units related to psychophysical thresholds in the human hand. Journal of Physiology, 297, 405-422.

Do you need this or any other assignment done for you from scratch?
We have qualified writers to help you.
We assure you a quality paper that is 100% free from plagiarism and AI.
You can choose either format of your choice ( Apa, Mla, Havard, Chicago, or any other)

NB: We do not resell your papers. Upon ordering, we do an original paper exclusively for you.

NB: All your data is kept safe from the public.

Click Here To Order Now!