Pub Date : 2019-07-27DOI: 10.15344/2456-4451/2019/149
Sílvia C. Fernandes
Named as the currency that would lead the monetary revolution, Bitcoin allows financial transactions without intermediation of banks that often charge high rates and are conducive to corruption threats. In Bitcoin, the intermediary is eliminated and with it its weaknesses. This perspective responds to the influence that corruption and mismanagement of banks and governments have on the economy (e.g. inflation).
{"title":"Bitcoin and Blockchain: Characteristics, Links and Implicit Potential for People and Markets","authors":"Sílvia C. Fernandes","doi":"10.15344/2456-4451/2019/149","DOIUrl":"https://doi.org/10.15344/2456-4451/2019/149","url":null,"abstract":"Named as the currency that would lead the monetary revolution, Bitcoin allows financial transactions without intermediation of banks that often charge high rates and are conducive to corruption threats. In Bitcoin, the intermediary is eliminated and with it its weaknesses. This perspective responds to the influence that corruption and mismanagement of banks and governments have on the economy (e.g. inflation).","PeriodicalId":31240,"journal":{"name":"International Journal of Software Engineering and Computer Systems","volume":"7 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79282979","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-06-29DOI: 10.15344/2456-4451/2019/147
J. B. Alonso, M. L. B. Pulido
One of the first AD symptoms is memory loss, as well as others as language difficulties or temporal and spatial disorientation. In more advanced stages, those skills for carrying out the daily tasks or, even, basic bodily functions such as walking or swallowing [1], decrease or disappear. In any case, when the first symptoms are clear and subsequently diagnosed, the damage produced is already irreparable and chronic. Today, the diagnosis process as a screening method is limited since it is long in time, expensive and highly invasive.
{"title":"Alzheimer's Disease: New Challenges for Speech Analysis","authors":"J. B. Alonso, M. L. B. Pulido","doi":"10.15344/2456-4451/2019/147","DOIUrl":"https://doi.org/10.15344/2456-4451/2019/147","url":null,"abstract":"One of the first AD symptoms is memory loss, as well as others as language difficulties or temporal and spatial disorientation. In more advanced stages, those skills for carrying out the daily tasks or, even, basic bodily functions such as walking or swallowing [1], decrease or disappear. In any case, when the first symptoms are clear and subsequently diagnosed, the damage produced is already irreparable and chronic. Today, the diagnosis process as a screening method is limited since it is long in time, expensive and highly invasive.","PeriodicalId":31240,"journal":{"name":"International Journal of Software Engineering and Computer Systems","volume":"9 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-06-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76355237","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-05-25DOI: 10.15344/2456-4451/2019/146
M. Abd-El-Barr
The speed and area performance of the byte-substitution (S-Box) impose a correlated impact on the speed and area of the Advanced Encryption System (AES) cryptosystem. In this paper, we present an efficient realization technique of the S-Box in the AES cryptosystem. We start by classifying the S-Box byte-substitution design techniques. We then provide a brief coverage of the hardware, software, and hybrid S-Box realization techniques. We then present an efficient S-Box realization technique that replaces the search needed in the 16 ×16 S-Box by four simpler searches two of them can be conducted in parallel and in a way that reduces the final search into searching within a set consisting of only four 2×2 cells which in turn leads to a faster search strategy. We also provide a simple hardware to carry out the search. A performance comparison among five realization techniques is conducted. The comparison is based in terms of the area (A) and the delay (T). It is shown that the technique due to Bertoni is the fastest followed by the technique due to Abd-El-Barr. In terms of area, it was found out that the technique due to Abd-El-Barr consumes the least area followed by the technique due to Canright. The technique due to Abd-El-Barr achieves the best normalized O(AT2) where A is the area and T is the critical path delay.
{"title":"Performance Assessment of an Efficient Search and Realization Technique of the S-Box in the AES Cryptosystem","authors":"M. Abd-El-Barr","doi":"10.15344/2456-4451/2019/146","DOIUrl":"https://doi.org/10.15344/2456-4451/2019/146","url":null,"abstract":"The speed and area performance of the byte-substitution (S-Box) impose a correlated impact on the speed and area of the Advanced Encryption System (AES) cryptosystem. In this paper, we present an efficient realization technique of the S-Box in the AES cryptosystem. We start by classifying the S-Box byte-substitution design techniques. We then provide a brief coverage of the hardware, software, and hybrid S-Box realization techniques. We then present an efficient S-Box realization technique that replaces the search needed in the 16 ×16 S-Box by four simpler searches two of them can be conducted in parallel and in a way that reduces the final search into searching within a set consisting of only four 2×2 cells which in turn leads to a faster search strategy. We also provide a simple hardware to carry out the search. A performance comparison among five realization techniques is conducted. The comparison is based in terms of the area (A) and the delay (T). It is shown that the technique due to Bertoni is the fastest followed by the technique due to Abd-El-Barr. In terms of area, it was found out that the technique due to Abd-El-Barr consumes the least area followed by the technique due to Canright. The technique due to Abd-El-Barr achieves the best normalized O(AT2) where A is the area and T is the critical path delay.","PeriodicalId":31240,"journal":{"name":"International Journal of Software Engineering and Computer Systems","volume":"6 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-05-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87596524","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-04-25DOI: 10.15344/2456-4451/2019/145
Yusuke Ishibayashi, S. Sugawara
This paper proposes an efficient message transmission method by direct short-range communications with mobile terminals based on epidemic routing. In a previous study, when a message packet arrives at its destination node, it floods the network with packets called “anti-packets,” and deletes packets with the same message in an effort to enhance the efficiency of the buffer memories of the other terminals. Because anti-packets are not issued until the message arrives at its destination, there is not an efficient termination process. In this paper, the timing to issue anti-packets is accelerated by observing the number of nodes that a message packets has gone through, allowing wasted message packets to be eliminated earlier. Computer simulations show that the proposed method improves the messagearrival rate and reduces the average time required for message arrival.
{"title":"An Efficient Message Forwarding Scheme with Epidemic Routing Considering the Number of Stopover Nodes in Delay Tolerant Network Environment","authors":"Yusuke Ishibayashi, S. Sugawara","doi":"10.15344/2456-4451/2019/145","DOIUrl":"https://doi.org/10.15344/2456-4451/2019/145","url":null,"abstract":"This paper proposes an efficient message transmission method by direct short-range communications with mobile terminals based on epidemic routing. In a previous study, when a message packet arrives at its destination node, it floods the network with packets called “anti-packets,” and deletes packets with the same message in an effort to enhance the efficiency of the buffer memories of the other terminals. Because anti-packets are not issued until the message arrives at its destination, there is not an efficient termination process. In this paper, the timing to issue anti-packets is accelerated by observing the number of nodes that a message packets has gone through, allowing wasted message packets to be eliminated earlier. Computer simulations show that the proposed method improves the messagearrival rate and reduces the average time required for message arrival.","PeriodicalId":31240,"journal":{"name":"International Journal of Software Engineering and Computer Systems","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90190696","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-04-04DOI: 10.15344/2456-4451/2019/144
A. Tomer
Software architecture design is intended to propose a software-intensive architectural solution for a required system. As such, the architecture needs to address all the required functionality while satisfying all the required quality attributes, which are usually referred to as the non-functional requirements. Therefore, a major concern of the software architecture is its behavior, besides its structure. Softwareintensive system specifications tend to be functional in nature, focusing on its behavior, i.e. what is expected to be done by the system, whereas quality attributes, which usually describe other properties of the system (e.g. performance, availability, safety, etc.) are, in many cases, described in general terms, and sometimes even being overlooked. The immediate result is that the software architecture, both behavioral and structural, fails to address quality issues whose absence is discovered only in late stages of system verification, validation or operation. This paper introduces a two-phase process by which a software-intensive architecture is constructed, satisfying both functional and non-functional requirements. In the first phase an initial architecture is constructed, comprising its physical, functional, combined and behavioral views. In the second phase a systematic approach is introduced to discover overlooked quality attributes of a system which might be violated during its operational (functional) scenarios. In this approach, quality attributes play the role of "devil's advocates", challenging the functionality by suggesting what can go wrong while the system performs its functional scenarios. Such challenges yield two results: (1) new "quality scenarios", which describe how the system should behave in order to prohibit a fault from causing a failure, and (2) modifications to the entire architecture needed to support the newly-derived functionality. 1In common parlance, the term devil's advocate describes someone who, given a certain point of view, takes a position he or she does not necessarily agree with (or simply an alternative position from the accepted norm), for the sake of debate or to explore the thought further [Wikipedia]. Special Issue: Software Architecture
{"title":"Functional Angels and Quality Devils: Incorporating Quality Scenarios into Functional Scenarios for Software-intensive System Architecture","authors":"A. Tomer","doi":"10.15344/2456-4451/2019/144","DOIUrl":"https://doi.org/10.15344/2456-4451/2019/144","url":null,"abstract":"Software architecture design is intended to propose a software-intensive architectural solution for a required system. As such, the architecture needs to address all the required functionality while satisfying all the required quality attributes, which are usually referred to as the non-functional requirements. Therefore, a major concern of the software architecture is its behavior, besides its structure. Softwareintensive system specifications tend to be functional in nature, focusing on its behavior, i.e. what is expected to be done by the system, whereas quality attributes, which usually describe other properties of the system (e.g. performance, availability, safety, etc.) are, in many cases, described in general terms, and sometimes even being overlooked. The immediate result is that the software architecture, both behavioral and structural, fails to address quality issues whose absence is discovered only in late stages of system verification, validation or operation. This paper introduces a two-phase process by which a software-intensive architecture is constructed, satisfying both functional and non-functional requirements. In the first phase an initial architecture is constructed, comprising its physical, functional, combined and behavioral views. In the second phase a systematic approach is introduced to discover overlooked quality attributes of a system which might be violated during its operational (functional) scenarios. In this approach, quality attributes play the role of \"devil's advocates\", challenging the functionality by suggesting what can go wrong while the system performs its functional scenarios. Such challenges yield two results: (1) new \"quality scenarios\", which describe how the system should behave in order to prohibit a fault from causing a failure, and (2) modifications to the entire architecture needed to support the newly-derived functionality. 1In common parlance, the term devil's advocate describes someone who, given a certain point of view, takes a position he or she does not necessarily agree with (or simply an alternative position from the accepted norm), for the sake of debate or to explore the thought further [Wikipedia]. Special Issue: Software Architecture","PeriodicalId":31240,"journal":{"name":"International Journal of Software Engineering and Computer Systems","volume":"76 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83764630","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-03-06DOI: 10.15344/2456-4451/2019/143
S. Tomisato, Jumpei Onji, K. Uehara
This paper proposes a non-linear distortion noise power control method with bandwidth control for multiple frequency band transmission which simultaneously uses plural frequency bands in wireless communication systems. The control method employs clipping and filtering, and generates out-of-band noise reduction signals using a part of used signal bands to reduce harmful interference in a primary existing system which shares frequency bands with the multi-band system. The improvement of Signalto- Noise Ratios (SNRs) in the bands used by the primary system is evaluated by computer simulations. The simulation results show that the proposed method at the band use rate of 50 % can improve them by 15 dB at the receiving power ratio of -30 dB to the spectrum sharing multi-band system.
{"title":"Transmission Performance Improvement by Non-Linear Distortion Noise Power Control in Multi-Band Systems","authors":"S. Tomisato, Jumpei Onji, K. Uehara","doi":"10.15344/2456-4451/2019/143","DOIUrl":"https://doi.org/10.15344/2456-4451/2019/143","url":null,"abstract":"This paper proposes a non-linear distortion noise power control method with bandwidth control for multiple frequency band transmission which simultaneously uses plural frequency bands in wireless communication systems. The control method employs clipping and filtering, and generates out-of-band noise reduction signals using a part of used signal bands to reduce harmful interference in a primary existing system which shares frequency bands with the multi-band system. The improvement of Signalto- Noise Ratios (SNRs) in the bands used by the primary system is evaluated by computer simulations. The simulation results show that the proposed method at the band use rate of 50 % can improve them by 15 dB at the receiving power ratio of -30 dB to the spectrum sharing multi-band system.","PeriodicalId":31240,"journal":{"name":"International Journal of Software Engineering and Computer Systems","volume":"299 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-03-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77050402","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-02-01DOI: 10.15282/IJSECS.5.1.2019.6.0056
M. S. Hazaa, Redhwan M. A. Saad, Mohammed A. Alnaklani
Traffic accidents are the leading causes beyond death; it is the concern of most countries that strive for finding radical solutions to this problem. There are several methods used in the process of forecasting traffic accidents such as classification, assembly, association, etc. This paper surveyed the latest studies in the field of traffic accident prediction; the most important tools and algorithms were used in the prediction process such as Back- propagation Neural Networks and the decision tree. In addition, this paper proposed a model for predicting traffic accidents based on dataset obtained from the Directorate General of Traffic Statistics, Ibb, Yemen.
{"title":"PREDICTION OF TRAFFIC ACCIDENT SEVERITY USING DATA MINING TECHNIQUES IN IBB PROVINCE, YEMEN","authors":"M. S. Hazaa, Redhwan M. A. Saad, Mohammed A. Alnaklani","doi":"10.15282/IJSECS.5.1.2019.6.0056","DOIUrl":"https://doi.org/10.15282/IJSECS.5.1.2019.6.0056","url":null,"abstract":"Traffic accidents are the leading causes beyond death; it is the concern of most countries that strive for finding radical solutions to this problem. There are several methods used in the process of forecasting traffic accidents such as classification, assembly, association, etc. This paper surveyed the latest studies in the field of traffic accident prediction; the most important tools and algorithms were used in the prediction process such as Back- propagation Neural Networks and the decision tree. In addition, this paper proposed a model for predicting traffic accidents based on dataset obtained from the Directorate General of Traffic Statistics, Ibb, Yemen.","PeriodicalId":31240,"journal":{"name":"International Journal of Software Engineering and Computer Systems","volume":"4 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84428145","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-02-01DOI: 10.15282/IJSECS.5.1.2019.2.0052
Belal A. Al-fuhaidi, H. Asaad, Sadik A. M. Al-Taweel
The ever increasing demands for the performance improvement in Multiprotocol Label Switching (MPLS) network have motivated to develop a resistant MPLS network to the failures at link, node and software of the MPLS network devices. The occurrence fault at link degrades the network performance due to data packets loss. This paper proposes an efficient model for rerouting traffic in MPLS network when a single and multi-fault occur in working link based on the protection switching and rerouting algorithms. In this model three algorithms are developed for fast fault recovery in MPLS network based on ingress LSR, alert LSR and core LSR. The proposed model has been simulated using Network Simulator (NS2) version 2.34, simulation results show that the proposed model significantly improves the network performance such that eliminates packet disorder, reduces the packets loss, get better PDR, decreases end to end delay and enhance throughput. The proposed model has less space complexity compared to other methods that reached to 13.33% in single fault and 33.33% in multi-fault and has a fast recovery time compared to other methods. Keywords: MPLS; Single-fault; Multi-fault; TAP; LSR
{"title":"AN EFFICIENT FAULT TOLERANCE MODEL FOR SINGLE AND MULTIFAULT IN MPLS NETWORKS","authors":"Belal A. Al-fuhaidi, H. Asaad, Sadik A. M. Al-Taweel","doi":"10.15282/IJSECS.5.1.2019.2.0052","DOIUrl":"https://doi.org/10.15282/IJSECS.5.1.2019.2.0052","url":null,"abstract":"The ever increasing demands for the performance improvement in Multiprotocol Label Switching (MPLS) network have motivated to develop a resistant MPLS network to the failures at link, node and software of the MPLS network devices. The occurrence fault at link degrades the network performance due to data packets loss. This paper proposes an efficient model for rerouting traffic in MPLS network when a single and multi-fault occur in working link based on the protection switching and rerouting algorithms. In this model three algorithms are developed for fast fault recovery in MPLS network based on ingress LSR, alert LSR and core LSR. The proposed model has been simulated using Network Simulator (NS2) version 2.34, simulation results show that the proposed model significantly improves the network performance such that eliminates packet disorder, reduces the packets loss, get better PDR, decreases end to end delay and enhance throughput. The proposed model has less space complexity compared to other methods that reached to 13.33% in single fault and 33.33% in multi-fault and has a fast recovery time compared to other methods. \u0000 \u0000Keywords: MPLS; Single-fault; Multi-fault; TAP; LSR","PeriodicalId":31240,"journal":{"name":"International Journal of Software Engineering and Computer Systems","volume":"3 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80207623","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-02-01DOI: 10.15282/ijsecs.5.1.2019.5.0055
Nurshahirah Abdul Malik, M. Othman, L. M. Yusuf
Recently, classification is becoming a very valuable tool where a large amount of data is used on a wide range of decisions for the education sector. Classification is a method that used to group data based on predetermined characteristics. It is utilized to classify the item as indicated by the features for the predefined set of classes. The main significance of classification is to classify data from large datasets to find patterns out of it. Nevertheless, it is very important to choose the best classification algorithm which is also called as the classifier. Therefore, this research aims to conduct comparative evaluation between four classifiers which are Deep Neural Network (DNN), Random Forest (RF), Support Vector Machine (SVM) and Decision Tree (DT). All these classifiers have its own efficiency and have an important role in identifying the set of populations based on the training datasets. To choose the best classifiers among the four classifiers, the classifiers performance is required to be evaluated based on the performance metrics. The performance metrics of these classifiers were determined using accuracy and sensitivity rates. This study used education case study on student’s performance data for two subjects, Mathematics and Portuguese from two Portugal secondary schools and data on the student's knowledge of Electrical DC Machines subject. After comparing the accuracy and sensitivity rates, DNN has the highest accuracy and sensitivity rate of classification and can be used to further the educationbased research in future.
{"title":"COMPARATIVE ANALYSIS OF CLASSIFIERS FOR EDUCATION CASE STUDY","authors":"Nurshahirah Abdul Malik, M. Othman, L. M. Yusuf","doi":"10.15282/ijsecs.5.1.2019.5.0055","DOIUrl":"https://doi.org/10.15282/ijsecs.5.1.2019.5.0055","url":null,"abstract":"Recently, classification is becoming a very valuable tool where a large amount of data is used on a wide range of decisions for the education sector. Classification is a method that used to group data based on predetermined characteristics. It is utilized to classify the item as indicated by the features for the predefined set of classes. The main significance of classification is to classify data from large datasets to find patterns out of it. Nevertheless, it is very important to choose the best classification algorithm which is also called as the classifier. Therefore, this research aims to conduct comparative evaluation between four classifiers which are Deep Neural Network (DNN), Random Forest (RF), Support Vector Machine (SVM) and Decision Tree (DT). All these classifiers have its own efficiency and have an important role in identifying the set of populations based on the training datasets. To choose the best classifiers among the four classifiers, the classifiers performance is required to be evaluated based on the performance metrics. The performance metrics of these classifiers were determined using accuracy and sensitivity rates. This study used education case study on student’s performance data for two subjects, Mathematics and Portuguese from two Portugal secondary schools and data on the student's knowledge of Electrical DC Machines subject. After comparing the accuracy and sensitivity rates, DNN has the highest accuracy and sensitivity rate of classification and can be used to further the educationbased research in future.","PeriodicalId":31240,"journal":{"name":"International Journal of Software Engineering and Computer Systems","volume":"16 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78068279","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-02-01DOI: 10.15282/IJSECS.5.1.2019.3.0053
O. Abikoye, G. K. Afolabi, T. O. Aro
Several problems are encountered by cardholders at the point of sale (POS) terminal, these include; inadequate security of automated teller machine (ATM) card through theft, not remembering personal identity number (PIN) and the problem of identifying cardholder as the owner of the card, these have caused delay process in transactions and also reduce the integrity of the POS machine. The existing POS machine uses PIN-Card as an authentication process in which the security can be easily breached. This paper proffers a solution to reduce the identified problems by applying a biometric system into POS machine. Iris scan was introduced at the authentication level of the existing POS machine. A system prototype was designed to imitate a typical PIN-card based POS system that used iris recognition to improve upon the security of the POS. The developed system demonstrated a two-tier architectural structure for recognition: the identification and verification module. The verification module which focused on the enrolment, normalization, localization, extraction of features and matching of iris images obtained from CASIA database. The experimental results showed that the developed system could significantly minimize cardholder fraud at the POS machine if not totally eradicated.
{"title":"BIOMETRIC BASED POINT OF SALE AUTHENTICATION SYSTEM","authors":"O. Abikoye, G. K. Afolabi, T. O. Aro","doi":"10.15282/IJSECS.5.1.2019.3.0053","DOIUrl":"https://doi.org/10.15282/IJSECS.5.1.2019.3.0053","url":null,"abstract":"Several problems are encountered by cardholders at the point of sale (POS) terminal, these include; inadequate security of automated teller machine (ATM) card through theft, not remembering personal identity number (PIN) and the problem of identifying cardholder as the owner of the card, these have caused delay process in transactions and also reduce the integrity of the POS machine. The existing POS machine uses PIN-Card as an authentication process in which the security can be easily breached. This paper proffers a solution to reduce the identified problems by applying a biometric system into POS machine. Iris scan was introduced at the authentication level of the existing POS machine. A system prototype was designed to imitate a typical PIN-card based POS system that used iris recognition to improve upon the security of the POS. The developed system demonstrated a two-tier architectural structure for recognition: the identification and verification module. The verification module which focused on the enrolment, normalization, localization, extraction of features and matching of iris images obtained from CASIA database. The experimental results showed that the developed system could significantly minimize cardholder fraud at the POS machine if not totally eradicated.","PeriodicalId":31240,"journal":{"name":"International Journal of Software Engineering and Computer Systems","volume":"17 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79817454","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}