Employees

=Staff Information= Nasser Dodic Sherif Elzanie

Main function:

List technologies used to identify employees and how they work.
 * 1) iris identification- it uses infared light ot identify certain dark patterns and unique features of the iris.
 * 2) digital fingerprints-Fingerprint identification, is the process of comparing questioned and known friction skin ridge impressions from fingers to determine if the impressions are from the same finger.
 * 3) hand geometry-The hand geometry scanner looks for unique features in the structure of the hand. These unique features include the finger thickness, length, and width, the distances between finger joints, the hand’s overall bone structure, etc.
 * 4) voice recognition-The key to Voice recognition is in the speech analysis. Voice Recognition programs take the digital recording and parse it into small, recognizable speech bits called "phonemes," via high-level audio analysis software.
 * 5) facial recognition- Facial recognition software is based on the ability to recognize a face and then measure the various features of the face.
 * 6) retina eye patterns- Retina scanners work using the reflection of infrared light off the retina. As infrared light is directed into the eye, some of the light is absorbed, while other light is reflected back to the scanner. The blood vessels on the retina absorb more light, reflecting less light than the tissue surrounding the vessels.Retinal scans also take measurements of the retina which are unique to the individual.
 * 7) signature identification-the signature recognition system extracts the unique features from the behavioral characteristics, which includes the time utilized by the individual to sign their name; the pressure applied from the pen to the writing tablet; the rate of speed in signing the signature; the overall size of the signature; and the quantity and the various directions of the strokes in the signature.

Discuss possible relationships between employees and their permissions. Every employee has unique permissions to different areas of the airport. Their permissions are only given to the areas that are necessary for them to complete their job.

Database Data List:
 * 1) Name
 * 2) Permissions
 * 3) Area of work

Unique Key/Identifier: 1.Fingerprint 2.Retina eye patterns 3.Iris eye patterns 4.Facial recognition