Parallel and distributed computation of a fingerprint access control system / Bopatriciat Boluma Mangata ... [et al.]

This work evaluates the runtime performance of a single-mode biometric recognition system for fingerprint-based access control to secure premises. To speed up the computation time in this system, we resorted to parallel programming, targeting more loops in the verification module. Our approach would...

Полное описание

Сохранить в:
Библиографические подробности
Главные авторы: Mangata, Bopatriciat Boluma (Автор), Muamba, Kadima (Автор), Khalaba, Fundji (Автор), Parfum, Bukanga Christian (Автор), Mbambi, Kisiaka (Автор)
Формат:
Опубликовано: Universiti Teknologi MARA, Perlis, 2022.
Предметы:
Online-ссылка:Link Metadata
Метки: Добавить метку
Нет меток, Требуется 1-ая метка записи!

MARC

LEADER 00000 am a22000003u 4500
001 repouitm_68842
042 |a dc 
100 1 0 |a Mangata, Bopatriciat Boluma  |e author 
700 1 0 |a Muamba, Kadima  |e author 
700 1 0 |a Khalaba, Fundji  |e author 
700 1 0 |a Parfum, Bukanga Christian  |e author 
700 1 0 |a Mbambi, Kisiaka  |e author 
245 0 0 |a Parallel and distributed computation of a fingerprint access control system / Bopatriciat Boluma Mangata ... [et al.] 
260 |b Universiti Teknologi MARA, Perlis,   |c 2022. 
500 |a https://ir.uitm.edu.my/id/eprint/68842/1/68842.pdf 
500 |a  Parallel and distributed computation of a fingerprint access control system / Bopatriciat Boluma Mangata ... [et al.]. (2022) Journal of Computing Research and Innovation (JCRINN) <https://ir.uitm.edu.my/view/publication/Journal_of_Computing_Research_and_Innovation_=28JCRINN=29/>, 7 (2): 1. pp. 1-10. ISSN 2600-8793  
520 |a This work evaluates the runtime performance of a single-mode biometric recognition system for fingerprint-based access control to secure premises. To speed up the computation time in this system, we resorted to parallel programming, targeting more loops in the verification module. Our approach would therefore be to parallelize all loops that are computationally intensive during the verification of fingerprints in the database. On this, we exploited Microsoft's Task Parallel Library, specifically exploiting the for and for each loop. On the test set performed in sequential and parallel versions in the different data sizes, namely 50, 100, 150, 200, 250, 300, 350, 400, 450, 500, 550, and 600, we can state that the results obtained by the sequential and parallel implementations of our performance test programs allowed us to determine the best approach. Therefore, it is very clear that the sequential program is too greedy in terms of computation time compared to the parallel program which minimizes the computation time. 
546 |a en 
690 |a Programming. Rule-based programming. Backtrack programming 
690 |a Detectors. Sensors. Sensor networks 
655 7 |a Article  |2 local 
655 7 |a PeerReviewed  |2 local 
787 0 |n https://ir.uitm.edu.my/id/eprint/68842/ 
787 0 |n https://crinn.conferencehunter.com/index.php/jcrinn 
787 0 |n 10.24191/jcrinn.v7i2.271 
856 4 1 |u https://ir.uitm.edu.my/id/eprint/68842/  |z Link Metadata