Premium Essay

Automated Fingerprint Identification System Research Paper

Submitted By
Words 812
Pages 4
OVERVIEW: Done.
ASK:
1. What are the common types of physical evidence?
2. What is class characteristics?
3. What is product rule?
4. What is Integrated Automated Fingerprint Identification System (IAFIS) and when was it created?
5. What is crime scene reconstruction?
READ: Done.
WRITE:
1. What are the common types of physical evidence?
a. Blood, semen and saliva.
b. Documents.
c. Drugs.
d. Explosives.
e. Fibers.
f. Fingerprints.
g. Firearms and ammunition.
h. Glass.
i. Hair.
j. Impressions.
k. Organs and physiological fluids.
l. Paint.
m. Petroleum products.
n. Plastic bags.
o. Plastic, rubber, and other polymers.
p. Powder residues.
q. Serial numbers.
r. Soil and minerals.
s. Tool marks.
t. Vehicle lights.
u. Wood …show more content…
What is product rule?
a. Product rule is multiplying together the frequencies of independently occurring genetic markers to obtain an overall frequency of occurrence for a genetic profile.
4. What is Integrated Automated Fingerprint Identification System (IAFIS) and when was it created?
a. IAFIS is a national fingerprint and criminal history system that is maintained by the FBI. IAFIS contains fingerprints and access to corresponding criminal history information for nearly 50 million subjects (or 500 million fingerprint images), which are submitted voluntarily to the FBI by state, local, and federal law enforcement agencies. IAFIS first became operational in 1999.
5. What is crime scene reconstruction?
a. Crime scene reconstruction is the method used to support a likely sequence of events by observing and evaluating physical evidence and statements made by those involved with the incident
EVALUATE: I believe that overall, I have a good understanding of the chapter. There are a few, small ideas talked about in this chapter that I will need to revisit. One of those ideas is section about the significance of physical evidence. I will need to look this over again just to make sure that I completely understand each …show more content…
The first topic in the chapter talks about the common types of physical evidence. It states that there are twenty-one common types of physical evidence. Some of the common types of physical evidence includes blood, semen, saliva, drugs, fibers, fingerprints, impressions and paint. The next topic talks about the significance of the physical evidence. The examination of the physical evidence is taken by a forensic scientist for identification or comparison. Identification is the process of determining a substance’s physical or chemical identify. Drug analysis, specie s determination, and explosive residue analysis are typical examples of the identification process in a forensic setting. Comparison is the process of ascertaining whether two or more objects have a more common origin. The next topic that is talked about is the product rule. The product rule involves multiplying together frequencies of independently occurring genetic markers to obtain an overall frequency of occurrence for a genetic profile. The next topic talked about is the forensic databases. The first forensic database talked about is the Integrated Automated Fingerprint Identification System also known as IAFIS. This system is a national fingerprint and criminal history system that is maintained by the FBI. The next database is the FBI’s Combined DNA Index System also known as CODIS. This system enables the

Similar Documents

Premium Essay

Journal

...(IJCSIS) International Journal of Computer Science and Information Security, Vol. 10, No. 3, March 2012 An Efficient Automatic Attendance System Using Fingerprint Reconstruction Technique Josphineleela.R Dr.M.Ramakrishnan Research scholar Department of Computer Science and Engineering Sathyabamauniversity Chennai,India ilanleela@yahoo.com Professor/HOD-IT Velammal Engineering College Chennai,India ramkrishod@gmail.com Abstract— Biometric time and attendance system is one of the most successful applications of biometric technology. One of the main advantage of a biometric time and attendance system is it avoids "buddy-punching". Buddy punching was a major loophole which will be exploiting in the traditional time attendance systems. Fingerprint recognition is an established field today, but still identifying individual from a set of enrolled fingerprints is a time taking process. Most fingerprint-based biometric systems store the minutiae template of a user in the database. It has been traditionally assumed that the minutiae template of a user does not reveal any information about the original fingerprint. This belief has now been shown to be false; several algorithms have been proposed that can reconstruct fingerprint images from minutiae templates. In this paper, a novel fingerprint reconstruction algorithm is proposed to reconstruct the phase image, which is then converted into the grayscale image. The proposed reconstruction algorithm ...

Words: 3558 - Pages: 15

Premium Essay

Technology and Communication Paper

...Communication Paper Rachel Clayton June 24, 2012 CJA/363 Lilah Blackstone  At some point in time, the development of technology undergoes change and improvement where our communication techniques begin to gradually develop. The criminal justice system is at the forefront of this development. One major example is New Orleans; they underwent the worst tragedy and have come out on top with better ways to run their criminal justice system. The city is plagued by violent crime, residents who will never be charged with a crime spend weeks in jail, and some serious offenders are released with no charges (The Vera Institute of Justice, 2007). The Vera Institute of Justice interviewed key stakeholders—including justice system leaders, representatives of nonprofit research and advocacy groups, and several members of the city council—and reviewed data on how the system has been operating after flooding devastated the city (The Vera Institute of Justice, 2007). New Orleans began rebuilding a justice system that is indeed both effective and just. New Orleans’ justice system would implement innovations that would allow the city to allocate more resources toward protecting public safety, improving public trust and confidence, and rebuilding the city (The Vera Institute of Justice, 2007). Around the nation other advances are being made that benefit all of the public. One of the technological techniques used is IAFIS. IAFIS stands for Integrated Automated Fingerprint Identification System. IAFIS...

Words: 1075 - Pages: 5

Free Essay

Automated Attendance Monitoring System

...power management of the classrooms in the colleges/schools. The use of low cost technologies for highly reliable applications with the help of newly innovated algorithms makes the automation process to reach the consumers at cheaper and reliable cost. (http://www.muxtronics.com) The widespread of embedded computer networks as part of everyday peoples’ lives is leading the current research towards smart environments and Ambient Intelligence (AmI). AmI is a new information paradigm where people are empowered through a digital environment that is “aware” of their presence and context and is sensitive, adaptive and responsive to their needs. Mark Weiser, described the smart environments as physical worlds that invisibly interact with smart sensors, actuators, displays, and computational elements that are seamlessly implanted into our daily live activities. However, smart environments have to be associated with different Artificial Intelligence (AI) techniques and algorithms including artificial neural networks, evolutionary computation, swarm intelligence, artificial immune systems, and fuzzy systems. Together with...

Words: 4807 - Pages: 20

Premium Essay

Biometric Attendance System

...developing a system, Student’s Attendance System (SAS) that will record the attendance of student in FEDERAL POLYTECHNIC NEKEDE. SAS using fingerprint technology to authenticate every student by using their fingerprint in order to get an accurate record. The fingerprint technology is cheaper and easy to implement compared to other biometrics technology. The fingerprint only authenticates the validated student. SAS with the fingerprint features can make the system secure because no student can record their attendance except to be authenticated by the system. Besides provides security, this new system provides efficiency to both lecturers and students. SAS focused on the developing system using SDLC as the methodology. This system using personal computer that is run under Windows platform and develop using VB, PHP and MySQL. This system uses the questionnaire method in order to analyze the user acceptance among respondents. In conclusion, this is important to provide the reliable and efficient record. 1.1 INTRODUCTION This chapter will focus on background of this project, problem of the manual system, the objectives, scope and significance of the project. 1.2 BACKGROUND Biometrics refers to the automatic identification of a person based on his or her physiological or behavioral characteristics. It includes fingerprint, iris, facial and retinal. Biometrics technologies are becoming the foundation of an extensive array of highly secure identification and personal...

Words: 2173 - Pages: 9

Premium Essay

Electronic Daily Time Record

...Attendance Management System using Biometrics. O. Shoewu, Ph.D.1,2* and O.A. Idowu, B.Sc. 1 1 Department of Electronic and Computer Engineering, Lagos State University, Epe Campus, Nigeria. 2 Department of Electrical and Electronics, University of Benin, Edo State, Nigeria. E-mail: engrshoewu@lasunigeria.org* ABSTRACT In this paper, the development of an attendance management system using biometrics is proposed. Managing student attendance during lecture periods has become a difficult challenge. The ability to compute the attendance percentage becomes a major task as manual computation produces errors, and also wastes a lot of time. For the stated reason, an efficient attendance management system using biometrics is designed. This system takes attendance electronically with the help of a finger print device and the records of the attendance are stored in a database. Attendance is marked after student identification. For student identification, a biometric (fingerprint) identification based system is used. This process however, eliminates the need for stationary materials and personnel for the keeping of records. Eighty candidates were used to test the system and success rate of 94% was recorded. The manual attendance system average execution time for eighty students was 17.83 seconds while it was 3.79 seconds for the automatic attendance management system using biometrics. The results showed improved performance over manual attendance management system. Attendance is marked...

Words: 3034 - Pages: 13

Premium Essay

Student Attendance System Using Fingerprint

...Title: STUDENT’S ATTENDANCE SYSTEM USING FINGERPRINT TECHNOLOGY by FARAHANUM BT MASRUNI (2004219959) FACULTY OF INFORMATION TECNOLOGY AND QUANTITATIVE SCIENCES BACHELOR OF SCIENCE (Hons) IN DATA COMMUNICATION AND NETWORKING Approved by the examining committee: ……………………………….. ( En. Syamsul Ariffin b Yahaya ) Project Supervisor ……………………………….. ( En. Farok b Azmat ) Project Examiner MARA UNIVERSITY OF TECHNOLOGY SHAH ALAM MAY 2006 CERTIFICATION OF ORIGINALITY This is to certify that I responsible for the work submitted in this project that the original work is my own except as specified in the reference and acknowledgement and that the original work contain here in have not been taken or done by unspecified sources or persons. ……………………………………….. Farahanum bt Masruni 2004219959 ii COPYRIGHT © UiTM ACKNOWLEDGEMENT Alhamdulillah, praise to Allah s.w.t, the most gracious and merciful for giving me the strength and wisdom in finishing this research. At last after a period of time, I have completed my final year project. For this golden opportunity, first and foremost, I would like to express my hearties gratitude to my supervisor, Encik Syamsul Ariffin b Yahaya, my examiner, Encik Farok b Azmat and my coordinator, Encik Adzhar b Abd Kadir for their understanding, and professional way s in assisting and giving their encouragement, guidance, comment and ideas that are useful towards in the development of my project paper. Very special thanks also...

Words: 3961 - Pages: 16

Premium Essay

Biometric Identification Technology

...Biometric Identification Technology | | By Group C: | HUMN432 | 6/10/2012 | | Table of Contents Introduction History of Biometric Identification Biometric Identification Advancement Timeline * Types of Biometric Identification Technologies and How They Work Benefits of Biometric Identification Technology How and Where Biometry is Used In the USA Controversial Issues and Legalities of Biometric Identification Conclusion Bibliography Introduction Biometric Identification Technology is the world-wide used computer science that identifies humans based on physiological and behavioral traits for access control and security. The computer processing idea has been around for hundreds of years but the equipment has only been available for the past several decades evolving to become better with each step. The need for a formal system to record and identify first-time and repeated offenders in the 1800s led the known Bertillon to develop anthropometrics to identify individuals. This advancement was later linked with computer systems to create a true biometric system identifier. The several types of biometric identifiers, later discussed, have evolved from a mere idea to an implemented security system used in airports, government programs, and even small businesses. The technology is used globally from the US to the UK, India, Germany, and many more. Its long history has created responsiveness and allowed countries to embrace the welfares of such a system. The...

Words: 7486 - Pages: 30

Premium Essay

Paper

...BIOMETRICS BY: WILLIAM C. NEWTON SECR 5080 INFORMATION SYSTEMS SECURITY TABLE OF CONTENTS 1. TITLE PAGE………………………………………………………………………1 2. TABLE OF CONTENTS………………………………………………………….2 3. ABSTRACT………………………………………………………………………..3 4. HISTORY…………………………………………………………………………..4 5. TYPES OF BIOMETRICS………………………………………………………….6 6. FACIAL RECOGNITION…………………………………………………………..7 7. RETNA SCANNER………………………………………………………………….8 8. FINGERPRINT……………………………………………………………………….9 9. HANDPRINT…………………………………………………………………………9 10. VOICE AUTHENTICATION………………………………………………………10 11. AUTHENTICATION………………………………………………………………...11 12. SUMMARY…………………………………………………………………………..11 13. REFERENCES………………………………………………………………………..12 ABSTRACT This paper previewed my research of biometrics from the early 500 BCs to the 21st century. Upon understanding some of the biometrics differences and earlier methods used, I think the world is definitely is a better place to live in, as well as a much safer world to be in. One example of how this was used to make the world a better place was where biometrics were used at the NFL Super Bowl game in Tampa, Florida. There are many different types and ways of using biometrics to prevent entry into certain places or even to catch criminals from further causing damage in society. Biometrics is the overall study of measurable characteristics, specifically in computer security biometrics refers to the different authentication techniques that rely on measurable physical characteristics...

Words: 2368 - Pages: 10

Premium Essay

Rfid

...International Journal of Scientific & Engineering Research Volume 4, Issue 2, February-2013 ISSN 2229-5518 1 RFID-Based Students Attendance Management System Arulogun O. T., Olatunbosun, A., Fakolujo O. A., and Olaniyi, O. M. Abstract In recent years, there have been rise in the number of applications based on Radio Frequency Identification (RFID) systems and have been successfully applied to different areas as diverse as transportation, health-care, agriculture, and hospitality industry to name a few. RFID technology facilitates automatic wireless identification using electronic passive and active tags with suitable readers. In this paper, an attempt is made to solve recurrent lecture attendance monitoring problem in developing countries using RFID technology. The application of RFID to student attendance monitoring as developed and deployed in this study is capable of eliminating time wasted during manual collection of attendance and an opportunity for the educational administrators to capture face-to-face classroom statistics for allocation of appropriate attendance scores and for further managerial decisions. Keywords: RFID, Lecture, Attendance, Passive tag, Reader INTRODUCTION T he emergence of electronic paradigm for learning compared to traditional method and availability of almost all information on the information superhighway(Internet), nowadays have caused students to be less motivated to come to the lecture rooms than ever before. Laziness on the...

Words: 3596 - Pages: 15

Free Essay

Biometric Authentication System

...Biometric Authentication System for Information Security Objective To explain about biometric system that can be used by the organization. By understand the biometric differences; organization can decide which technique is the most suitable for the business. Methodology The method used to know about biometric is scientific literature which will develop quantitative identification as the measurement for the authentication. Outcome To give better understanding about biometric system, biometric techniques as well as the advantages and disadvantages of biometric use in organization. Conclusion Organization can understand better value of biometric system and what is needed to implement the biometric system into the company. Keywords Biometrics CHAPTER I INTRODUCTION 1.1 Background Since January 2008, the technology had developed rapidly causing the world advancing towards a new era. A survey on 2008 had estimated about 541.7 million computers are connected in more than 250 countries on every continent even Antarctica. The internet is not a single network but it is a worldwide network that connected every individual computer hosts to network connection, in a variety ways. Thus, individuals and organizations can reach the internet without regard to national or geographic boundaries or time of day. However, along with the advantages and easy access to get information, there are also many risks such as the valuable information will be lost, stolen, changed or misused...

Words: 5215 - Pages: 21

Free Essay

Fingerprint Biometric Authentication for Enhancing Staff Attendance System

...International Journal of Applied Information Systems (IJAIS) – ISSN : 2249-0868 Foundation of Computer Science FCS, New York, USA Volume 5– No.3, February 2013 – www.ijais.org Fingerprint Biometric Authentication for Enhancing Staff Attendance System Oloyede Muhtahir O. Dept. of Info. and Comm. Science University of Ilorin, Ilorin. Adedoyin Adeyinka O. Dept. of Info. and Comm. Science University of Ilorin, Ilorin. ABSTRACT Biometric technology that involves the identification and verification of individuals by analyzing the human body characteristics has been widely used in various aspect of life for different purposes, most importantly as regards this study the issue of staff attendance. Despite the numerous advantages of the biometric system and its impact to various work sectors across the globe, most biometric technology users face the issue of defining the right and accurate biometric technology system that will be cost effective in solving particular problems in specific environment. In this paper, a study was conducted using a telecommunication company in the South West region of Nigeria, in order to determine the specific biometric identifier that can be used to enhance their traditional staff attendance system which presently affects the productivity of the organization. The study was conducted using a quantitative approach by designing a questionnaire as the data collection instrument based on different biometric technologies. The survey...

Words: 4926 - Pages: 20

Premium Essay

Alhaji

...Investigation into Biometric Technologies and the Development of a Fingerprint Recognition Application Student Name: Robert Heaney ST No: 10550804. Supervisor: Jonathan G. Wallace . . . . . . . . . . Note: Incomplete, this document is currently in draft Abstract This preliminary document covers the presentation phase of a final year BSc (Hons) computing science project aiming to investigate biometric technologies and develop a fingerprint recognition application to allow logging of student attendance at lectures. The introduction offers some background to the project and establishes the aims and objectives of the project overall. Following on from the introduction, the literature review presents a critique of research material that provides the basis for the project. This material includes a number of texts, journals and research papers as well as additional information sourced from the Web. As drawn from the literature, the subject areas covered include; history and background to modern biometrics; technological, social, organisational and environmental influences; key technologies in the market today; design issues, including security, performance and testing. In chapter 3, attention turns to requirements analysis for the development of a fingerprint recognition system. The process follows a requirements engineering approach to development by formally establishing user requirements and allowing continuous requirements assessment...

Words: 5371 - Pages: 22

Free Essay

Project

...International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320–088X IJCSMC, Vol. 2, Issue. 3, March 2013, pg.18 – 25 RESEARCH ARTICLE An Automated Biometric Attendance Management System with Dual Authentication Mechanism Based on Bluetooth and NFC Technologies Samuel King Opoku Computer Science Department, Kumasi Polytechnic, Ghana samuel.k.opoku@gmail.com Abstract— Attendance Management System (AMS) is the easiest way to keep track of attendance for community organisations for day-to-day monitoring of attendance and manpower analysis. AMS comes in four types. These are Manual, Biometric, Card-based or E-Commerce systems. This paper presents the implementation of an AMS that is based on Bluetooth and NFC technologies in a multi-user environment. It uses fingerprint and the Bluetooth address of the NFC-enabled phone of the user to authenticate the identity of the user. A Java based desktop application receives the NFC tag IDs, other information associated with the mobile phone and the user and submits them to an analyser for the interpretation of the user’s behaviour. Key Terms: - Attendance Management System, Authentication, Biometric, Bluetooth, Mobile Phone, NFC. I. INTRODUCTION Attendance Management System (AMS) is the easiest way to keep track of attendance for community organizations such as school clubs, scouting units, church groups, business organisations and volunteer groups. AMS is useful...

Words: 3797 - Pages: 16

Premium Essay

Web Based Inmate Etc.

...CHAPTER I INTRODUCTION Project Context A system is said to be effective if the end is realized with a maximum of success while using a minimum of means. To test, therefore, the effectiveness of the inmate system, the end or the objectives and the means or the strategies availed of to secure the desired end must be examined. According to A. Sarras, N.D., in today’s world Management Information System, a computerized processing system is needed in generating information for the people in the organization to meet the information needed in decision making to achieve the corporate objective of the organization. In any organization, small or big, a major portion of the time goes in data collection, processing, documenting it to the people. Hence, a major portion of the overheads goes into this kind of unproductive work in the organization. Every individual in an organization is continuously looking for some information which is needed to perform his/her task. Hence, the information is people-oriented and it varies with the nature of the people in the organization. The difficulty in handling this multiple requirement of the people is due to a couple of reasons. The information is a processed product to fulfill an imprecise need of the people. It takes time to search the data and may require a difficult processing path. It has a time value and unless processed on time and communicated, it has no value. The scope and the quantum of information is individual-dependent and it is...

Words: 1283 - Pages: 6

Free Essay

Future of Policing Proposal

...catch more criminals and solve crimes a lot quicker and more efficiently. These two specific technologies allow law enforcement to catch more criminals and solve cases a lot quicker. GPS tracking systems are some of the most advanced technology that has come into play for law enforcement in this day and age. In the past, officers would have the tedious job of following criminals on foot for days or even months at a time ("GPS Tracking for Law Enforcement", 2013). Officers now have GPS tracking technology, and that allows them to monitor potential suspects actions and movements by remote in almost real time from practically anywhere by a computer that his hooked up to the internet. Officers are able to also monitor them by using an IPhone, Samsung Galaxy, and even IPad. This incredible technology will permit law enforcement to dedicate more of their valuable time, resources, and money by resolving crimes that individuals commit a lot faster. This will give the officers the advantage that they need to crack all types of crimes, ranging from the minor crimes to the very difficult criminal cases. Usually when an officer is tracking a suspect he or she has to sit out all hours of the night on a stakeout or patrolling the areas that the person was last scene. A GPS tracking system is an absolute nightmare to the enemy that is...

Words: 1265 - Pages: 6