Pub Date : 2012-10-01DOI: 10.1109/ICOS.2012.6417638
M. Uma, G. Padmavathi
The wireless communications has revolutionized human life, but has also created several issues relating to its usage. One of the biggest issues involved in use of the wireless communications is related to network performance. The process of refining the network routine by changing activities, methods, procedures, and tools that pertain to the operation, administration, maintenance, and provisioning of networked systems is network management. Network operations will be executed by authenticated authorities like administrator. The increasing complexity of networks has promulgated a dire need for monitoring the traffic of the network which helps to identify any failure in the performance of the network. It also helps to identify attacks in the network and predicts the network status. This paper evaluates the performance of router based network traffic monitoring techniques such as SNMP, RMON and Netflow and the implementation of these techniques is carried out to ascertain the most effective monitoring technique among the three. The NS-2 simulator is used for implementation. SNMP performs better than the other two methods for WLAN.
{"title":"Relative suitability of router based traffic monitoring techniques for WLAN (Wireless local area network) environment","authors":"M. Uma, G. Padmavathi","doi":"10.1109/ICOS.2012.6417638","DOIUrl":"https://doi.org/10.1109/ICOS.2012.6417638","url":null,"abstract":"The wireless communications has revolutionized human life, but has also created several issues relating to its usage. One of the biggest issues involved in use of the wireless communications is related to network performance. The process of refining the network routine by changing activities, methods, procedures, and tools that pertain to the operation, administration, maintenance, and provisioning of networked systems is network management. Network operations will be executed by authenticated authorities like administrator. The increasing complexity of networks has promulgated a dire need for monitoring the traffic of the network which helps to identify any failure in the performance of the network. It also helps to identify attacks in the network and predicts the network status. This paper evaluates the performance of router based network traffic monitoring techniques such as SNMP, RMON and Netflow and the implementation of these techniques is carried out to ascertain the most effective monitoring technique among the three. The NS-2 simulator is used for implementation. SNMP performs better than the other two methods for WLAN.","PeriodicalId":319770,"journal":{"name":"2012 IEEE Conference on Open Systems","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127820744","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-10-01DOI: 10.1109/ICOS.2012.6417654
Muhammad Bilal Munir, Arif Mushtaq
Application Programming Interface (API) in software development acts as an important milestone for software productions. It is believed that API usability impacts upon ease-in-use, operationability and acceptability among its audience. Likewise, an ever increasing need for extending and integrating Usability Engineering (UE) has become vital for the success of software products. Earlier researches within this domain do not address API's usability via a component-based framework approach. The proposed framework emphasizes on consolidated formulation of various usability and quality models to derive chunks of dimensional variables. Further the paper highlights API usability practices and heuristics applied in API development process and discusses API product's artifacts component to be used in deriving further product-related components to support enhancing usability.
{"title":"A framework for extending usability engineering: API usability essentials: Extending usability via component-based platform","authors":"Muhammad Bilal Munir, Arif Mushtaq","doi":"10.1109/ICOS.2012.6417654","DOIUrl":"https://doi.org/10.1109/ICOS.2012.6417654","url":null,"abstract":"Application Programming Interface (API) in software development acts as an important milestone for software productions. It is believed that API usability impacts upon ease-in-use, operationability and acceptability among its audience. Likewise, an ever increasing need for extending and integrating Usability Engineering (UE) has become vital for the success of software products. Earlier researches within this domain do not address API's usability via a component-based framework approach. The proposed framework emphasizes on consolidated formulation of various usability and quality models to derive chunks of dimensional variables. Further the paper highlights API usability practices and heuristics applied in API development process and discusses API product's artifacts component to be used in deriving further product-related components to support enhancing usability.","PeriodicalId":319770,"journal":{"name":"2012 IEEE Conference on Open Systems","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121421339","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-10-01DOI: 10.1109/ICOS.2012.6417647
M. N. Diyana, D. R. A. Rambli
Non-interactive or low interactive media such as radio can become highly immersive and realistic, engendering a compelling sense of presence for the participant. An example of low interactive technology is a simple Image-based Virtual Reality (IBVR) environment which has no perceptual characteristics of the interaction with haptic sensations which can provide high user's presence. Therefore, the study investigates whether IBVR environment can elicit user's presence even without computer animation? Furthermore, the three pole model of presence”, “mental imagery space” is discussed in this study. One hundred participants were involved in the study. Established Presence Questionnaires (PQ) was used to critically appraise the study. The result is discussed in qualitative analysis. As predicted, user's imagery exists as the effect of user's presence in IBVR environment. Results also suggest that the users interact with the IBVR environment through non-symbolic systems, such as the perceptual and the motor system which is similar with the three pole model of presence. Furthermore, this study has important implications for both our understanding of sense of presence exists in IBVR environment even without animation or haptic sensation.
{"title":"Sense of presence on Image based Virtual Reality determines user's mental imagery","authors":"M. N. Diyana, D. R. A. Rambli","doi":"10.1109/ICOS.2012.6417647","DOIUrl":"https://doi.org/10.1109/ICOS.2012.6417647","url":null,"abstract":"Non-interactive or low interactive media such as radio can become highly immersive and realistic, engendering a compelling sense of presence for the participant. An example of low interactive technology is a simple Image-based Virtual Reality (IBVR) environment which has no perceptual characteristics of the interaction with haptic sensations which can provide high user's presence. Therefore, the study investigates whether IBVR environment can elicit user's presence even without computer animation? Furthermore, the three pole model of presence”, “mental imagery space” is discussed in this study. One hundred participants were involved in the study. Established Presence Questionnaires (PQ) was used to critically appraise the study. The result is discussed in qualitative analysis. As predicted, user's imagery exists as the effect of user's presence in IBVR environment. Results also suggest that the users interact with the IBVR environment through non-symbolic systems, such as the perceptual and the motor system which is similar with the three pole model of presence. Furthermore, this study has important implications for both our understanding of sense of presence exists in IBVR environment even without animation or haptic sensation.","PeriodicalId":319770,"journal":{"name":"2012 IEEE Conference on Open Systems","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123048933","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-10-01DOI: 10.1109/ICOS.2012.6417619
M. Othman, S. N. Ismail, H. Noradzan
Students' attendance records are important documents for academic institutions that reflect the students' performances and the credibility of the academic institutions. Nevertheless, the process of managing these documents had been done manually, by pen and papers thus making it less efficient. This paper discusses about the development of the new Online Attendance System as the enhancement of the previous developed system named Attendance Register System for higher academic institutions in Malaysia. The new online system is being developed by adapting the concept of the web-based system architecture. The web-based system architecture used in the development of this system involves integration of various open source web-based technologies such as MySQL, PHP and Apache Web Server hence making the Online Attendance System more efficient and cost effective. The development of the Online Attendance System involves four main phases which are the construction of the conceptual framework where the scopes and requirements as well as the target users of the system had been identified, developing the proposed system's architecture by adapting to the web-based architecture, and the construction of the logical design and the physical design. The Online Attendance System consists of automated processes such as able to generate online attendance reports, warning letters and graph charts thus making the processes of recording and reporting the students' attendances more efficient and well-organized.
学生出勤记录是反映学生成绩和学校信誉的重要文件。然而,管理这些文件的过程是用笔和纸手工完成的,因此效率较低。本文讨论了新的在线考勤系统的开发,作为先前开发的系统的改进,称为出勤登记系统在马来西亚的高等院校。新的在线系统是根据基于网络的系统架构的概念开发的。本系统的开发采用基于Web的系统架构,集成了MySQL、PHP、Apache Web Server等多种基于Web的开源技术,使在线考勤系统更加高效、经济。在线考勤系统的开发主要包括四个阶段:确定系统的范围、需求和目标用户的概念框架的构建;适应基于web的体系结构的系统架构的开发;逻辑设计和物理设计的构建。在线考勤系统由自动化流程组成,例如能够生成在线考勤报告,警告信和图表,从而使学生的考勤记录和报告过程更加高效和有序。
{"title":"An adaptation of the web-based system architecture in the development of the online attendance system","authors":"M. Othman, S. N. Ismail, H. Noradzan","doi":"10.1109/ICOS.2012.6417619","DOIUrl":"https://doi.org/10.1109/ICOS.2012.6417619","url":null,"abstract":"Students' attendance records are important documents for academic institutions that reflect the students' performances and the credibility of the academic institutions. Nevertheless, the process of managing these documents had been done manually, by pen and papers thus making it less efficient. This paper discusses about the development of the new Online Attendance System as the enhancement of the previous developed system named Attendance Register System for higher academic institutions in Malaysia. The new online system is being developed by adapting the concept of the web-based system architecture. The web-based system architecture used in the development of this system involves integration of various open source web-based technologies such as MySQL, PHP and Apache Web Server hence making the Online Attendance System more efficient and cost effective. The development of the Online Attendance System involves four main phases which are the construction of the conceptual framework where the scopes and requirements as well as the target users of the system had been identified, developing the proposed system's architecture by adapting to the web-based architecture, and the construction of the logical design and the physical design. The Online Attendance System consists of automated processes such as able to generate online attendance reports, warning letters and graph charts thus making the processes of recording and reporting the students' attendances more efficient and well-organized.","PeriodicalId":319770,"journal":{"name":"2012 IEEE Conference on Open Systems","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132764571","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-10-01DOI: 10.1109/ICOS.2012.6417648
N. S. A. Bakar, C. Boughton
Software measurement can play a major role in ensuring the quality and reliability of software products. The measurement activities require appropriate tools to collect relevant metric data. Currently, there are several such tools available for software measurement. The main objective of this paper is to discuss the validation of results when using a combination of multiple measurement tools especially for products built using object-oriented techniques and languages. In this paper, we highlight four tools for collecting metric data, in our case from several Java-based open source projects. Our findings show that the tools provide different results for similar metrics and we discuss the methods used to validate the results reported by the tools. Our research is currently based on the work of Card and Glass, who argue that design complexity measures (data complexity and structural complexity) are indicators/predictors of procedural/cyclomatic complexity (decision counts) and errors (discovered from system tests).
{"title":"Validation of measurement tools to extract metrics from open source projects","authors":"N. S. A. Bakar, C. Boughton","doi":"10.1109/ICOS.2012.6417648","DOIUrl":"https://doi.org/10.1109/ICOS.2012.6417648","url":null,"abstract":"Software measurement can play a major role in ensuring the quality and reliability of software products. The measurement activities require appropriate tools to collect relevant metric data. Currently, there are several such tools available for software measurement. The main objective of this paper is to discuss the validation of results when using a combination of multiple measurement tools especially for products built using object-oriented techniques and languages. In this paper, we highlight four tools for collecting metric data, in our case from several Java-based open source projects. Our findings show that the tools provide different results for similar metrics and we discuss the methods used to validate the results reported by the tools. Our research is currently based on the work of Card and Glass, who argue that design complexity measures (data complexity and structural complexity) are indicators/predictors of procedural/cyclomatic complexity (decision counts) and errors (discovered from system tests).","PeriodicalId":319770,"journal":{"name":"2012 IEEE Conference on Open Systems","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133028209","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-10-01DOI: 10.1109/ICOS.2012.6417636
Khairul Anwar Sedek, M. A. Omar, Shahida Sulaiman
An effective e-government platform provides greater access to government services among citizens, businesses, and tourists. However, most e-government portals are not integrated as each government agency has its own portal. This may cause confusion and becomes a cumbersome task among stakeholders. This paper proposes a one-stop e-government architecture that integrates one-stop portal, e-government service application, and e-government service provider. The architecture provides seamless interoperability of e-government services among different government agencies. This work exploits various Web technologies and service oriented architecture approaches such as Web portal, portlet, service component architecture, Web services, and BPEL. Finally, this work presents the proof-of-concept of the proposed architecture and a case study in an e-government service environment.
{"title":"Interoperable SOA-based architecture for e-government portal","authors":"Khairul Anwar Sedek, M. A. Omar, Shahida Sulaiman","doi":"10.1109/ICOS.2012.6417636","DOIUrl":"https://doi.org/10.1109/ICOS.2012.6417636","url":null,"abstract":"An effective e-government platform provides greater access to government services among citizens, businesses, and tourists. However, most e-government portals are not integrated as each government agency has its own portal. This may cause confusion and becomes a cumbersome task among stakeholders. This paper proposes a one-stop e-government architecture that integrates one-stop portal, e-government service application, and e-government service provider. The architecture provides seamless interoperability of e-government services among different government agencies. This work exploits various Web technologies and service oriented architecture approaches such as Web portal, portlet, service component architecture, Web services, and BPEL. Finally, this work presents the proof-of-concept of the proposed architecture and a case study in an e-government service environment.","PeriodicalId":319770,"journal":{"name":"2012 IEEE Conference on Open Systems","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125139541","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-10-01DOI: 10.1109/ICOS.2012.6417652
M. Al-Bashayreh, N. Hashim, O. T. Khorma
This paper is a study of; software framework designs, context awareness computing, and Mobile Patient Monitoring Systems (MPMS) using wireless sensors, to find out the lacks and the gaps in the literature. To achieve this, a set of success factors are used to characterize and analyze these frameworks. These success factors are introduced in this paper as a set of designs and domain requirements that must be addressed to design extensible and reusable context-aware application frameworks to develop MPMS using wireless sensors. To enhance the existing frameworks design, a research agenda is presented as the primary objective of this paper. This research agenda is expected to help researchers fill the gaps in the designed frameworks.
{"title":"Towards successful design of context-aware application frameworks to develop Mobile Patient Monitoring Systems using wireless sensors","authors":"M. Al-Bashayreh, N. Hashim, O. T. Khorma","doi":"10.1109/ICOS.2012.6417652","DOIUrl":"https://doi.org/10.1109/ICOS.2012.6417652","url":null,"abstract":"This paper is a study of; software framework designs, context awareness computing, and Mobile Patient Monitoring Systems (MPMS) using wireless sensors, to find out the lacks and the gaps in the literature. To achieve this, a set of success factors are used to characterize and analyze these frameworks. These success factors are introduced in this paper as a set of designs and domain requirements that must be addressed to design extensible and reusable context-aware application frameworks to develop MPMS using wireless sensors. To enhance the existing frameworks design, a research agenda is presented as the primary objective of this paper. This research agenda is expected to help researchers fill the gaps in the designed frameworks.","PeriodicalId":319770,"journal":{"name":"2012 IEEE Conference on Open Systems","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127343579","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-10-01DOI: 10.1109/ICOS.2012.6417608
P. Appavoo, Anuja Meetoo-Appavoo, A. Chutoo, B. Durgahee
The Open Source Software (OSS) philosophy has revolutionized the world of software usage and development by opening the codes. It was accompanied with a number of freedoms that definitely leads to a continuous enhancement and advancement in these software. At the same time, a benefit of this philosophy is that its adoption implies a reduction of software piracy and, in a few decades, perhaps the near extinction of this crime. Furthermore, the evaluation of adoption of OSS by different companies remains a fuzzy one as the most common approach is the use of questionnaires for a survey. In this paper, an automated methodology is proposed so as to evaluate the level of OSS adoption by online businesses. We also demonstrated how network protocols can be used as fingerprints to determine the penetration level of OSS in public hosts. The study was conducted on the public network underlying Mauritius and revealed the extent to which OSS is adopted. The methodology used can be applied to other territories for a similar assessment.
{"title":"Using network protocols' fingerprints to efficiently determine the penetration level of open source software in online businesses","authors":"P. Appavoo, Anuja Meetoo-Appavoo, A. Chutoo, B. Durgahee","doi":"10.1109/ICOS.2012.6417608","DOIUrl":"https://doi.org/10.1109/ICOS.2012.6417608","url":null,"abstract":"The Open Source Software (OSS) philosophy has revolutionized the world of software usage and development by opening the codes. It was accompanied with a number of freedoms that definitely leads to a continuous enhancement and advancement in these software. At the same time, a benefit of this philosophy is that its adoption implies a reduction of software piracy and, in a few decades, perhaps the near extinction of this crime. Furthermore, the evaluation of adoption of OSS by different companies remains a fuzzy one as the most common approach is the use of questionnaires for a survey. In this paper, an automated methodology is proposed so as to evaluate the level of OSS adoption by online businesses. We also demonstrated how network protocols can be used as fingerprints to determine the penetration level of OSS in public hosts. The study was conducted on the public network underlying Mauritius and revealed the extent to which OSS is adopted. The methodology used can be applied to other territories for a similar assessment.","PeriodicalId":319770,"journal":{"name":"2012 IEEE Conference on Open Systems","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124202612","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-10-01DOI: 10.1109/ICOS.2012.6417626
M. Kamil, K. A. Jalil
Since the introduction of QR Codes in the 90's, many companies have developed QR Code generators and mobile applications to read QR Codes. Despite the obvious benefits of next-generation data transfers, they have yet to be widely accepted and practiced. One of the main reasons is the use of unique language characters such as Arabic characters, Japanese Kanji, Thai Abugida and so forth. An attempt at embedding Arabic characters into QR Code for example, will result in the character's Unicode representation to be automatically encoded and/or decoded by default, instead of the original alphabet as a result of a method called Romanization. Thus, the intended use of the generated code has been useless. It is also noted that Romanization causes each character to be encoded in its own unique codeword which devours more space than encoding it with codeword for character combinations. In order to help solve this problem, this paper proposes the use of an algorithm that compares each word from an Arabic input with an internal codeword library that will then select the shortest codeword possible for single character and two-character combinations to replace the default Unicode representation, which also serves as a space saving method that allows longer messages to be encoded in a single QR Code. In return, the same method is also used to properly decode the message.
{"title":"The embedding of Arabic characters in QR code","authors":"M. Kamil, K. A. Jalil","doi":"10.1109/ICOS.2012.6417626","DOIUrl":"https://doi.org/10.1109/ICOS.2012.6417626","url":null,"abstract":"Since the introduction of QR Codes in the 90's, many companies have developed QR Code generators and mobile applications to read QR Codes. Despite the obvious benefits of next-generation data transfers, they have yet to be widely accepted and practiced. One of the main reasons is the use of unique language characters such as Arabic characters, Japanese Kanji, Thai Abugida and so forth. An attempt at embedding Arabic characters into QR Code for example, will result in the character's Unicode representation to be automatically encoded and/or decoded by default, instead of the original alphabet as a result of a method called Romanization. Thus, the intended use of the generated code has been useless. It is also noted that Romanization causes each character to be encoded in its own unique codeword which devours more space than encoding it with codeword for character combinations. In order to help solve this problem, this paper proposes the use of an algorithm that compares each word from an Arabic input with an internal codeword library that will then select the shortest codeword possible for single character and two-character combinations to replace the default Unicode representation, which also serves as a space saving method that allows longer messages to be encoded in a single QR Code. In return, the same method is also used to properly decode the message.","PeriodicalId":319770,"journal":{"name":"2012 IEEE Conference on Open Systems","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132453736","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-10-01DOI: 10.1109/ICOS.2012.6417639
Mahmood Al-khassaweneh, Bashar Smeirat, Talal Bin Ali
The increase in security level due to the use of biometric recognition systems compared to traditional identification systems is helping in the rapid advancement of such systems. The use of Fingerprint or Iris recognition systems is considered to be reliable and accurate. Both systems do have some drawbacks and errors. In order to minimize the error and increase the accuracy, we propose a hybrid system for identification by using both fingerprint recognition and Iris recognition systems. In this paper, the algorithm used for identification for Iris image was based on Ng et al algorithm using Rapid Haar Wavelet Decomposition while the algorithm used for fingerprint identification presented by Porpanomchai et al is based on the Euclidean distance from the bifurcation point to the core point. Both algorithms were modified and then combined for the hybrid system. The simulation results show the improvement in performance of the proposed method and the added advantages of combining both identifications systems.
{"title":"A hybrid system of Iris and Fingerprint recognition for security applications","authors":"Mahmood Al-khassaweneh, Bashar Smeirat, Talal Bin Ali","doi":"10.1109/ICOS.2012.6417639","DOIUrl":"https://doi.org/10.1109/ICOS.2012.6417639","url":null,"abstract":"The increase in security level due to the use of biometric recognition systems compared to traditional identification systems is helping in the rapid advancement of such systems. The use of Fingerprint or Iris recognition systems is considered to be reliable and accurate. Both systems do have some drawbacks and errors. In order to minimize the error and increase the accuracy, we propose a hybrid system for identification by using both fingerprint recognition and Iris recognition systems. In this paper, the algorithm used for identification for Iris image was based on Ng et al algorithm using Rapid Haar Wavelet Decomposition while the algorithm used for fingerprint identification presented by Porpanomchai et al is based on the Euclidean distance from the bifurcation point to the core point. Both algorithms were modified and then combined for the hybrid system. The simulation results show the improvement in performance of the proposed method and the added advantages of combining both identifications systems.","PeriodicalId":319770,"journal":{"name":"2012 IEEE Conference on Open Systems","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132016998","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}