Master of Science in Electrical Engineering (MSEE)


Electrical and Computer Engineering

Document Type



Since ancient time, an access control device has been used for securing valuable properties as well as lives from threatening peoples. The most representative security device is Lock/Key. Recently, those security device technologies have been improved tremendously and provided various types of security methods. Nevertheless, these methods are not individually perfect to provide optimal security so that in recent years many such methods have been combined and used together to provide the required level of security. However, such combination can enhance security for limited number of users only but very difficult to provide scalable security with the number of users increases. They, most of the time, are not convenient for wide range of users (i.e., the innocent users who do not pose any threat) due to access time delay and different layers of authentication. We believe that the system should exhibit capabilities that support adaptive security procedures for different range of users so most innocent users require minimum layer of identity authentication and verification while suspicious users may require passing through maximum along with some additional layers of security authentication and verification. These capabilities enable the system providing enhanced security as well as convenience to the users. A natural question in providing enhanced security is how to categorize certain individual users who require additional layers of authentication. We address this question by proposing a novel smart access control (SAC) system which can identify and categorize suspicious users from the analysis of their behavioral activities and bio-information.



Document Availability at the Time of Submission

Release the entire work immediately for access worldwide.

Committee Chair

Li, Xin