A Novel System of Fingerprint Recognition Approach for Immigration Control
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 3
Abstract
Abstract : Insecurity is a pressing and important issue that needs urgent attention in Nigeria. The dramatic increase in worldwide flow of people, goods, and ideas has created a new group of threats. These are global organized crimes such as smuggling, trafficking, terrorism; cross‐border crimes, illegal migration, amongst others. It has been noted that these foreigners device a means of beating security devices put in place at the border. The Nigerian Immigration uses Automated Fingerprint identification system (AFIS) minutiae base, which is the most popular and extensively used method for fingerprint identification. It show poor performance for real time authentication and it has less noise tolerant unlike the correlation base approach. The authors therefore proposes an hybrid fingerprinting method that combines two approaches namely minutiae and correlation methods that can help identify identity fraud. The sole idea behind this is that one technique makes up for the deficiency of the other by so doing we obtain a reliable and efficient result and provide a more secured environment where immigrants will not be able to beat the system with their fraudulent tactics or acts as currently experienced. Java programming language is used because of its platform independence, scalability, easy integration, implementation and upgrade.
Authors and Affiliations
Fatai . O. Waheed , Awotunde . J. Bamidele , Matiluko . E. Opeyemi
Fuzzy Logic Expert System for the Diagnosis of Chili Diseases
Chilli plant is one of the major cash crop in the world, many economy depends on its production. Chilli farmer has lost a lot of their crop due to diseases which in return causes farmers to loss lot of money and time suc...
Comparing Ethernet and Soft RoCE for MPI Communication
Abstract: RDMA has pleasant consideration in the late 1990 when the Virtual Interface Architecture was introduced. This growth has accelerated with the introduction of Open Fabrics Alliance’s (OFA’s) Verb Interface...
Controlling the Behavior of a Neural Network Weights Using Variables Correlation and Posterior Probabilities Estimation
ABSTRACT: In this article, a number of posterior probabilistic based equations were introduced to detect the effect of controlling the correlation between variables on the behavior of feed forward neural network we...
An Efficient Methodology for Clustering Uncertain Data Based on Similarity Measure
Abstract: In data mining clustering is one of the most important and crucial task. There exists various clustering techniques like partitioning and density based techniques. The previous methods worked on traditional par...
Secure Multi-Keyword Top-K Retrieval Over Encrypted Cloud Data Using Homomorphic Encryption
Abstract: Using Cloud Storage, users can remotely store their data and enjoy on-demand high quality applications and services. To ensure safety of stored data, it becomes must to encrypt data before storing in the global...