Parallel and distributed computation of a fingerprint access control system / Bopatriciat Boluma Mangata ... [et al.]

This work evaluates the runtime performance of a single-mode biometric recognition system for fingerprint-based access control to secure premises. To speed up the computation time in this system, we resorted to parallel programming, targeting more loops in the verification module. Our approach would...

Full description

Saved in:
Bibliographic Details
Main Authors: Mangata, Bopatriciat Boluma (Author), Muamba, Kadima (Author), Khalaba, Fundji (Author), Parfum, Bukanga Christian (Author), Mbambi, Kisiaka (Author)
Format: Book
Published: Universiti Teknologi MARA, Perlis, 2022.
Subjects:
Online Access:Link Metadata
Tags: Add Tag
No Tags, Be the first to tag this record!

MARC

LEADER 00000 am a22000003u 4500
001 repouitm_68842
042 |a dc 
100 1 0 |a Mangata, Bopatriciat Boluma  |e author 
700 1 0 |a Muamba, Kadima  |e author 
700 1 0 |a Khalaba, Fundji  |e author 
700 1 0 |a Parfum, Bukanga Christian  |e author 
700 1 0 |a Mbambi, Kisiaka  |e author 
245 0 0 |a Parallel and distributed computation of a fingerprint access control system / Bopatriciat Boluma Mangata ... [et al.] 
260 |b Universiti Teknologi MARA, Perlis,   |c 2022. 
500 |a https://ir.uitm.edu.my/id/eprint/68842/1/68842.pdf 
500 |a  Parallel and distributed computation of a fingerprint access control system / Bopatriciat Boluma Mangata ... [et al.]. (2022) Journal of Computing Research and Innovation (JCRINN) <https://ir.uitm.edu.my/view/publication/Journal_of_Computing_Research_and_Innovation_=28JCRINN=29/>, 7 (2): 1. pp. 1-10. ISSN 2600-8793  
520 |a This work evaluates the runtime performance of a single-mode biometric recognition system for fingerprint-based access control to secure premises. To speed up the computation time in this system, we resorted to parallel programming, targeting more loops in the verification module. Our approach would therefore be to parallelize all loops that are computationally intensive during the verification of fingerprints in the database. On this, we exploited Microsoft's Task Parallel Library, specifically exploiting the for and for each loop. On the test set performed in sequential and parallel versions in the different data sizes, namely 50, 100, 150, 200, 250, 300, 350, 400, 450, 500, 550, and 600, we can state that the results obtained by the sequential and parallel implementations of our performance test programs allowed us to determine the best approach. Therefore, it is very clear that the sequential program is too greedy in terms of computation time compared to the parallel program which minimizes the computation time. 
546 |a en 
690 |a Programming. Rule-based programming. Backtrack programming 
690 |a Detectors. Sensors. Sensor networks 
655 7 |a Article  |2 local 
655 7 |a PeerReviewed  |2 local 
787 0 |n https://ir.uitm.edu.my/id/eprint/68842/ 
787 0 |n https://crinn.conferencehunter.com/index.php/jcrinn 
787 0 |n 10.24191/jcrinn.v7i2.271 
856 4 1 |u https://ir.uitm.edu.my/id/eprint/68842/  |z Link Metadata