Volume 4, Issue 6, 2014

By | August 11, 2018

Development of A Computerized Biometric Control Examination Screening And Attendance Monitoring System With Fees Management

Adeoye Temitope Onaolamipo
School of Computer Science, Mathematics & Information Technology, Houdegbe North America University, Republic of Benin.

Abstract— Examination is one of the ways to assess the receptiveness of student to various class teachings in various schools or institutions from primary to post – primary and tertiary institutions. But this is not without problem like impersonation, student class absenteeism and debtor student sitting for examination especially in private institutions. The proposed system developed with the aim of solving stated problems. The system did not only has the ability to take student class attendance and screening before and after examination but it can also be used to verify whether such student is in debit to the institution or whether the student has paid required percentage of the tuition before being allowed to sit for the examination thereby reducing number of student in debit before examination started, it will also eliminate impersonation during examination and stress of manual class attendance taking and record keeping, also avoid writing of name of absent student unlike in manual process of class attendance. The system will also make it easier to calculate required percentage of class attendance before any student is allowed to sit for an examination in any institution. The system adopted biometric access control techniques, which is designed with extended graphical user interface by using Microsoft visual studio 2010 and integrated with Microsoft fingerprint reader. The student information is stored by MySQL which serve as database located in the user’s computer or server.

Keywords- Biometric; Fingerprint; Examination; Attendance; Tuition; Fees; Institution.

Enhanced Wireless Transmitted Message Security By Encryption Complex Transformation

Oleg Viktorov , Middle East University, College of Information Technology, Computer Information System Department, Amman, Jordan.
Ahmed Shihab, Middle East University, College of Information Technology, Computer Science Department, Amman, Jordan.

Abstract—Wireless communications have less hacking immunity than wired communications. With the increase of dependability on wireless data transfer and calling, it is necessary to develop new rigid algorithm to add more levels of security on the wireless data. In the fact, the effort that is continuously put in hacking the wireless transmitted data is more than the effort that is put in building secure communication channels. A packet transfer security model for wireless communication by the mean of cryptography and complex transformation. Was presented a secret key encryption / decryption algorithm was developed and presented in this paper. The encryption algorithm is demonstrated to decrypt the message and convert it to meaningless rapish data. The cryptographic encryption / decryption of the wireless packet is a first level security procedure, while the second level of security is being added by sending not the encrypted packet itself, but the complex transformation of that packet. Discrete cosine transform (DCT) and discrete wavelet transform (DWT) have been compared. The comparison was bases on peak signal to noise ration (PSNR) and mean square error (MSE). The wavelet transformation space is larger than the discrete cosine transform, so, the PSNR was much higher in DWT than DCT. The MSE is approximately the same for both.

Keywords – wireless security; encryption; discrete wavelet transform; discrete cosine transform.

Leave a Reply

Your email address will not be published. Required fields are marked *