Using codes in place of Fingerprints images during image processing for Criminal Information in large Databases and Data warehouses to reduce Storage, enhance efficiency and processing speed
Journal Title: INTERNATIONAL JOURNAL FOR ELECTRONIC CRIME INVESTIGATION - Year 2017, Vol 1, Issue 1
Abstract
The purpose of this work is to assign codes to the fingerprints images stored in large databases / Data warehouses, the images require large amount of storage as compared to a numeric code. Moreover, when fingerprint images are compared to other fingerprint images, the process is more time consuming as compared to the numeric codes. It is proposed to keep up all fingerprint images in a separate database file along with their codes. This file may be a supplementary file with respect to Master database file. In addition to this, the codes of fingerprint images may be stored in Master Database/ Data warehouse for all records. The search queries can be processed using the numeric codes. In this manner, the Time Complexity and Space Complexity are reduced considerably. Whenever, any fingerprint image is received for searching its record, first its code is obtained by proposed algorithm and then this code is used to search the record from database/Data Warehouse making entire procedure faster and efficient.
Authors and Affiliations
DR AFTAB MALIK, ENGR MUJTABA ASAD, WAQAR AZEEM
Advanced User Interfaces from iOS To Windows 8
This article discusses porting advanced user interface features from an iOS app to a Windows Store app. We use an electronic medical record (EMR) application for this case study. This paper can give new direction for win...
DNA Fingerprints Facial Prints and Other Digital Forensics as Evidence in Criminal Investigation and Court Proceedings
The purpose of this paper is to focus on the legitimacy and importance of digital evidence such as fingerprints, DNA, polygraph, auto-radiography, and facial-prints and their admissibility in investigations and court pro...
Data Breaches Security Issues for Cloud Based Internet of Things
Now a day’s Internet of Things (IoT) and cloud computing are latest popular technologies. Both technologies have great role in our life. Their adoption and utilization are relied upon increasingly inescapable and making...
The Reality of Cyber Security
The purpose of this article is to provide information about cyber security. It gives an analysis that would be useful in taking measure to prevent attacks. The judgment of this analysis is made by expertise and knowledge...
In-Demand Skillsets in Cybersecurity
In recent years, a huge shift to digitization has been observed on a global level. Due to the advantage of having easy access and other benefits, digitization is being adopted fast. With digitization, the ever-growing th...