ABSTRACT
This dissertation investigates a novel method for augmenting security and simplifying access control,
combining advanced facial recognition technology with QR-coded identification cards to determine
authorized access. QR codes, or ’Quick Response codes, ’ are two-dimensional barcodes composed of
black squares on a white grid. They are designed for quick scanning and serve as a rapid means to
access various types of information by simply scanning them with a QR code reader. This technology has
gained widespread popularity due to its convenience in swiftly transferring information and directing
users to websites, apps, or specific content through mobile device camera scans.
Our study was conducted in Malawi, an African country, at the Malawi University of Science and
Technology. The results of the study’s evaluation, which was carried by 18 young adults, reveal that the
system is user-friendly and highly satisfactory, with over 80% of participants expressing contentment.
Additionally, the system effectively distinguishes between authorized and unauthorized users, facilitating
rapid access control.
However, it’s important to recognize certain limitations in our study. The sample primarily consisted of
young adults, raising questions about the generalizability of our findings to a more diverse demographic,
including older adults and children. Additionally, the relatively small sample size may affect the statistical
significance of our results.
Despite these limitations, our study highlights the potential of this system to improve security and
operational efficiency, particularly in the context of Malawi. Future research should encompass broader
contexts, including both developed and developing nations, and incorporate a more diverse cross-section
of the population, encompassing different age groups and ethnic backgrounds.
This dissertation marks the initial exploration of this technology’s potential to enhance security and
operational efficiency, with a particular focus on developing countries. Early findings suggest significant
promise for its application in educational institutions, public buildings, and workplaces.
REFERENCES
Group Github https://github.com/BrianUlemuMalani/sky/tree/main
Group Google Drive https://drive.google.com/drive/folders/16o7wLcec9r63PhZJDCs6L5GO9_
nrenOj?usp=share_link
GEAS On Google Drive https://drive.google.com/drive/folders/1QSE2ZmT9YVdFfZ-
D1xD4r80Tj3WXOVFf?usp=share_link
Presentation Video https://drive.google.com/file/d/1ToW8hznk5mjsKTUulsS3eWllIr_ni9ZY
/view?usp=share_link
Evaluation Form https://forms.gle/31mMrML3VYWAZWkA8
Lee, S. M., & Lee, K. H. (2020). A review of gate entry authentication systems. Security and Privacy, 18(1),
100-109.
Gow, P., & Wuyts, K. (2017). Authentication: From passwords to public keys. IEEE Security & Privacy,
15(6), 86-98.
Bounouh, S., & Abdellatif, A. (2019). A survey on security and privacy challenges in gate entry
authentication systems. In 2nd International Conference on Computer Applications & Information
Security (ICCAIS) (pp. 1-6). IEEE.
Al-Azzawi, F., & Mahyoub, M. A. (2019). A comparative study on gate entry authentication systems. In
2019 IEEE International Conference on Computer Applications (ICCA) (pp. 1-6). IEEE.
Huda, S., & Nasir, Q. (2019). A review of gate entry authentication systems. International Journal of
Engineering and Technology, 7(3), 1-12.
Liedtka, J. (2015). Design thinking for organizations: A practical guide to its use in new product
development, innovation, and social challenges. John Wiley & Sons.
Mason, J., Dave, R., Chatterjee, P., Graham-Allen, I., Esterline, A., & Roy, K. (2020, December). An
Investigation of Biometric Authentication in the Healthcare Environment. Array, 8, 100042.
Zhang, R., & Yan, Z. (2019). A Survey on Biometric Authentication: Toward Secure and Privacy-Preserving
Identification. IEEE Access s (Vol. 7, pp. 5994â ˘A¸S6009).
International Journal of Scientific Technology Research (November 2016). A Review of Authentication
Method 5(11):246-249
Atwady, Y., & Hammoudeh, M. (2017). A Survey on Authentication Techniques for the Internet of Things.
In Proceedings of the International Conference on Future Networks and Distributed Systems. ICFNDS
â ˘A´Z17: International Conference on Future Networks and Distributed Systems. ACM.
Wazid, M., Das, A. K., Hussain, R., Succi, G., & Rodrigues, J. J. P. C. (2019). Authentication in cloud driven
IoT-based big data environment: Survey and outlook. In Journal of Systems Architecture (Vol. 97, pp.
185â ˘A¸S196). Elsevie





Comments