Volume 2, No. 2, December 2017
ISSN: 2518-6493
Copyright © 2017 Amity University Dubai For private circulation only No part of this publication may be reproduced or transmitted in any form without permission from Amity University, Dubai. Disclaimer The authors are solely responsible for the contents of their respective papers included in this issue. The publishers or Amity University, Dubai do not take any responsibility for the same in any manner.
---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------Amity Journal of Engineering and Technology Vol. 2, No 2
ISSN: 2518-6493
Fro m t he E ditor’s D es k
We have the privilege to introduce the fourth issue of the Amity Journal of Engineering and Technology (AJET), a peer-reviewed multidisciplinary scientific journal that focuses on emerging trends in various domains of engineering and technology. AJET aims to provide a platform to researchers to share their ideas and emerging trends, across varied themes related to the disciplines of engineering, technology, and allied areas. The current issue of the journal is a compilation of six papers, wherein authors have discussed ideas ranging from contemporary architectures like the early Islamic architectural tradition of Arabian world. This particular issue also includes a study that focuses on sustainable mud houses in Dinajpur (Bangladesh) which could be very useful for developing nations for cost effective housing. There are three papers with applications of information and communication technology, with one presenting a good survey of implementation techniques for systems based on Internet-of-things (IoT). We would like to extend our sincere gratitude to the authors of the papers, from different countries, without whose dedication to research, this journal would not have been possible. We would also like to thank the reviewers for their valuable comments to the authors and the editorial committee, for extending support in bringing out this journal in its present form. All published issues of AJET bear testimony to the zeal and commitment of the founding editors of the journal in providing a common forum to researchers to share their ideas and build upon them, adding to the process of knowledge creation. We hope that academics, researchers, and industry experts will find AJET useful, as they set out to explore the fascinating world of advanced engineering, emerging technologies, and inspiring architectures. We will continue to publish interesting articles with more focus on applications of engineering, science & technology, and architecture.
Prof. Dr. Piyush Maheshwari Editor in Chief
---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------Amity Journal of Engineering and Technology Vol. 2, No 2
ISSN: 2518-6493
Contents Vol. 2, No. 1 1
Modeling the Use of Energy Harvesting in Wireless Communication Networks Osifeko M.O, Sanusi O.I, Abolade O.R, Oyetola O.K, Olaniyi K.A Department of Computer and Electrical Engineering, Olabisi Onabanjo University…………………......………………………………………………………………...7
2
A Secure Students’ Attendance Monitoring System O.K. Oyetola, A.A. Okubanjo , O.O Olaluwoye Computer and Electrical & Electronics Engineering Department, Olabisi Onabanjo University, Ago Iwoye, Nigeria……...…………………………………….………………... 14
3
Effect of Principal Component analysis in Block Dependency Feature based Uncalibrated Steganalysis Deepa Suresh Research Scholar, Banasthali Vidyapeeth, Rajasthan,India…...………………………..…………………….…26
4
Learning from the past: The early Islamic architectural tradition of Arabian world, A Case study over Qusayr Amra’s construction technique and structural system Sayed Ahmed Student, Masters of Monumental Heritages (MA) Anhalt University of Applied Sciences, Dessau, Germany …………………...……………………….….…31
5
An Internet-of-Things (IOT) Based System Development and Implementation: A Survey Anu Priya George Research Scholar, Noorul Islam Centre For Higher Education…………...………………………………….……….……….….…46
6
In search of resilience: Exploring mud houses in Dinajpur, Bangladesh Fatiha Polin, Shahin Sultana Research Associate, Bengal Institute, Dhaka, Bangladesh Junior Architect, Inspace Atelier, Dhaka, Bangladesh……………………………………………………..54
---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------Amity Journal of Engineering and Technology Vol. 2, No 2
ISSN: 2518-6493
A Secure Students’ Attendance Monitoring System O.K. Oyetola Computer and Electrical & Electronics Engineering Department, Olabisi Onabanjo University, Ago Iwoye, Nigeria
A.A. Okubanjo Computer and Electrical & Electronics Engineering Department, Olabisi Onabanjo University, Ago Iwoye, Nigeria
O.O Olaluwoye Computer and Electrical & Electronics Engineering Department, Olabisi Onabanjo University, Ago Iwoye, Nigeria
Abstract- Security of data is essential in authentication systems such as attendance monitoring system. A Students’ attendance monitoring system is an integral part of Academic Information System (AIS) in most educational institution. Research have shown that biometric systems developed for authentication application stored template in unprotected format which are vulnerable and susceptible to security treats. This paper aims to develop a secured fingerprint based biometric cryptosystem for attendance monitoring. A total of 500 fingerprints were captured, out of which 300 fingerprints were used for training while 200 fingerprints were used for testing. Minutiae based algorithm was used to extract and select biometric features. Biometric features were encrypted using Advanced Encryption Standard Algorithm (AES). The system was developed and implemented using Java programming language to operate at varying threshold value. The developed system’s performance was evaluated using False Reject Rate (FRR) and False Accept Rate (FAR) as performance metrics. The results for FRR were 0, 0, 1, and 2 % at 200, 300, 400 and 500 threshold value respectively while results for FAR were 2, 2, 0, 0 % at 200, 300, 400 and 500 threshold value respectively. Keywords: Biometric, Attendance monitoring, Authentication, Template, Encryption 1.0 Introduction Technological innovation, in recent time had reshaped the process of information management globally. The importance of a reliable and efficient IT infrastructures for the success of an enterprise hardly needs any explanation. As schools, colleges, and universities increasingly rely on these infrastructure to service staffs, students, parents and the general public, computer system is no longer a peripheral to the management of a university. At the core of these systems is an Academic Information Management System (AIS), managing all academic processes and operations in educational institution. AIS is expected to be stringent in terms of security in order to eliminate unauthorized access to information, impersonation, and data theft. A generic AIS is made-up several sub-systems interoperating for effective and reliable performance. Students’ Attendance Monitoring System (SAMS), a sub-system of AIS has received tremendous attention lately, this is attributed to notable achievement recorded in the field of biometrics for the design of authentication system[1]. Unlike other methods such as bar codes, magnetic stripes, radio frequency identification (RFID), biometric uses unique psychological or behavioural traits of individuals to authenticate. Consequently, traits such as fingerprints, face image, iris, and signature had been widely accepted for information system security and authentication which had provoked hackers with interest in discovering methods of attacking biometric systems. A possible leakage of ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------Amity Journal of Engineering and Technology Vol. 2, No 2
ISSN: 2518-6493 these biometric templates can lead to serious security and privacy threats[2]. Therefore, a deliberate measure has to be put in place to secure templates generated for SAMS. In this paper we proposed an approach of securing biometric templates. A biometric cryptosystem was developed for monitoring students’ attendance using fingerprint trait for verification. Students’ information were encrypted using Advanced Encryption Standard (AES) using secret keys generated from templates. To further improve the security afforded by the system, templates were stored as Binary Large Object (BLOB) in MYSQL database secured with Message Digest 5 (MD 5) Hashing Algorithm. 2.0 Literature review SAMS had gain unprecedented attention in recent times due to revolution in ICT especially in the area of digital signal processing. Akinduyite et al. [3], presented a fingerprint based attendance management system. There systems used Crossing Number (CN) method for features extraction, which extracts the ridge endings and bifurcations from the skeleton image by examining the local neighbourhoods of each ridge pixel using a 3 x 3 window. Microsoft’s Structured Query Language (SQL) Server 2005 was used as the backend to store template in plain format, exposing the system to severe security threat. In [4], a Biometric Control Examination Screening And Attendance Monitoring System With Fees Management was developed using fingerprint access control techniques, which is designed with extended graphical user interface by using Microsoft visual studio 2010 and integrated with Microsoft fingerprint reader. The system stores only student information in MySQL database while templates are saved as plain text in a folder on the server consequently baring the template to unauthorized access. Authors in [5],[6],[7] and [8] proposed and developed SAMS using biometrics without considering template security and data encryption. Their systems are susceptible to template attack and data theft. Atuegwu, et al [9] uses a bimodal biometric system to monitor students attendance. In their approach face and fingerprint were used as traits for verification and fusion was done at decision level which is considered as loosely coupled integration [10]. Even though their system took care of possible limitation of large similarities in the feature sets used to represent traits, it never implement template security. Furthermore, it is pertinent to note that researchers had also applied other technology, such as RFID to monitor student attendance. In [11], authors use RFID and password based access techniques to secure students’ information. The challenge with this method is that authentication is done based on what students presented and not on who they are. RFID cards can be lost or stolen while password can be forgotten. The same challenge is also envisaged in [12] as it place the burden of carrying card around on the students. Information were also store in plain unprotected format in the database. 2.1 Biometric System A biometric system is fundamentally a pattern-recognition system that distinguishes a person based on a trait derived from physiological or behavioral characteristic that the person possesses[10]. The trait is usually stored in a database after being extracted as shown in Figure 2. Most biometric system are ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------Amity Journal of Engineering and Technology Vol. 2, No 2
ISSN: 2518-6493 in two stages, enrolment and verification. The data that is captured during enrollment is stored in the biometric system as a template or reference. Biometric system software uses an algorithm to extract features that are appropriate to the biometrics data as presented by the user, or enrollee[13]. It is important to note that biometric templates are only a record of distinguishing features of a person’s biometric characteristic or trait. Templates are usually not actual images of the fingerprint, iris, or hand, etc. Biometric templates are generally only numerical (mathematical) representations of key trait (or minutia) read in a person’s biometric feature. A biometric system based on physiological characteristics is generally more reliable than one which adopts behavioral characteristics, even if the latter may be easier to integrate within certain specific applications [14]. Biometric system can operate in two modes: verification and identification. While identification involves comparing the acquired biometric information against templates corresponding to all users in the database, verification involves comparison with only those templates corresponding to the claimed identity. This implies that identification and verification are two problems that should be dealt with separately [15]. However, it should be noted that both require querying the template database for decision making. Many different aspects of human physiology, chemistry or behavior can be used for biometric authentication. The selection of a particular biometric feature for use in a specific application involves consideration of several factors. [10] Identified seven of such factors to be used when assessing the suitability of any trait for use in biometric authentication.
Fig. 1. Basic Architecture of Biometric System 3.0 Developed System Architecture The attendance monitoring system consists of several modules to enroll and verify students. The system is divided into two stages; enrolment and monitoring as shown in Figure 2 and Figure 3. In our approach, biometric features are extracted from fingerprints while cryptography key are generated using minutiae points from fingerprints template. Consequently, information are encrypted based on individual’s unique traits which implies that the presence of a subject (owner of data) is required to view or access information. ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------Amity Journal of Engineering and Technology Vol. 2, No 2
ISSN: 2518-6493 To further enhance the integrity of the system, templates and encrypted data are store in MySQL DBMS. Access to the database is secured with MD Hash 5 algorithm. Details of the modules are as in next page.
Fig. 2. Enrolment module of developed system
Fig. 3. Monitoring Module of developed system 3.1 Enrolment Stage Student’s data (matric number, name, sex, department, programme, course etc.) and biometrics information (fingerprint data.) are acquired at this stage. A graphical user interface (GUI) is designed to provide a user friendly mechanism for collecting the details as shown in Figure 4. The enrollment ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------Amity Journal of Engineering and Technology Vol. 2, No 2
ISSN: 2518-6493 stage of the system is divided into different software module for seamless data follow and easy error correction. As depicted in Figure 2, the modules are sensor module, feature extraction module, binarization module, and encryption module and template database. The essence of the sensor module is to sense and scan fingerprints for further image processing. This is achieved by using DigitalPersona 4500 Fingerprint Scanner to enhance capturing high quality images.
Fig. 4. Enrolment module interface 3.2 Features Extraction The developed SAMS adopts minutiae based matching algorithm for fingerprint recognition to minimize significantly the number of fingerprints referenced for each authentication procedure. The feature extractor finds the ridge endings and ridge bifurcations from the input fingerprint images. If ridges can be perfectly located in an input fingerprint image, then minutiae extraction becomes a simple task of extracting singular points in a thinned ridge map. However in practice, it is not always possible to obtain a perfect ridge map. The performance of the extractor depends heavily on the quality of the input fingerprint image. Fingerprint images may not always have well-defined ridge structures due to many factors (aberrant formations of epidermal ridges of fingerprints postnatal marks, occupational marks, problems with acquisition devices.). 3.3 Binarization of Extracted Features Biometric features extracted from student fingerprint is converted into binary large object (BLOB) to enhance the system security because it is very difficult to recover the binary object in plaintext without the prior knowledge of its size. This is achieved using the public interface representation in the Java programming language as an SQL BLOB value. A Blob object is valid for the duration of the transaction in which it was created. Methods in the interfaces ResultSet, CallableStatement, and PreparedStatement, such as getBlob and setBlob allow access to SQL BLOB value. ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------Amity Journal of Engineering and Technology Vol. 2, No 2
ISSN: 2518-6493 The Blob interface provides methods for getting the length of an SQL BLOB (Binary Large Object) value, for materializing a BLOB value on the client, and for determining the position of a pattern of bytes within a BLOB value. In addition, this interface has methods for updating a BLOB value. A typical example of a BLOB value by the system in a text editor is shown in Figure 5, the BLOB presents no meaningful information as regarding the biometric template. Code snippet of the Security Engine designed for the system is as in next page Fig.5.
Fig. 5. BLOB data in a text editor 3.4 Encryption Module Advanced Encryption Standard (AES) cryptography algorithm was employed to encrypt all entries in the database. Consequently, subject information is not saved in plain text for enhanced system security. AES algorithm works on the principle of Substitution Permutation network. The AES cipher is identified as a number of reiterations of transformation rounds that translate the input plaintext into the final output of cipher text. Using this approach, an encryption key is generated from biometric template of each subject key to protect personal data distinctively. A set of reverse rounds are applied to transform cipher text back into the original plaintext using the same encryption key. This module employs the Java Cryptography Architecture (JCA) to implement AES. Code snippet of the Security Engine designed for the system is as follows: public String encrypt(String plainText) throws Exception { byte[] plainTextByte = plainText.getBytes(); cipher = Cipher.getInstance("AES"); key secretKey = generateKey(template); cipher.init(Cipher.ENCRYPT_MODE, secretKey); byte [] encryptedByte = cipher.doFinal (plainTextByte); Base64.Encoder encoder = Base64.getEncoder (); String encryptedText = encoder.encodeToString (encryptedByte); return encryptedText; } public String decrypt (String encryptedText)throws Exception { Base64.Decoder decoder = Base64.getDecoder(); byte[] encryptedTextByte = decoder.decode(encryptedText); cipher = Cipher.getInstance("AES"); key secretKey = generateKey(template); cipher.init(Cipher.DECRYPT_MODE, secretKey); ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------Amity Journal of Engineering and Technology Vol. 2, No 2
ISSN: 2518-6493 byte[] decryptedByte = cipher.doFinal(encryptedTextByte); String decryptedText = new String(decryptedByte); return decryptedText; }
The database helper classes used the security engine to encrypt data when saving data to the database and to decrypt data when retrieving data from the data base as depicted in the following code snippet. Fig. 6 shows the encrypted data view from the database. coder = new SecurityEngine(); public String getStudentID() { return subjectdetailInfo.get("subjectID"); } public String decryptSubjectID() throws Exception{ return coder.decrypt(subjectdetailInfo.get("subjectID")); } public void setSubjectID(String subjectID) throws Exception{ subjectdetailInfo.put("subjectID", coder.encrypt(subjectID)); } public String getSurname() throws Exception{ return subjectdetailInfo.get("surname"); } public String decryptSurname() throws Exception{ return coder.decrypt(subjectdetailInfo.get("surname")); } public void setSurname(String surname) throws Exception{ subjectdetailInfo.put("surname", coder.encrypt(surname)); }
Fig.6. Database view of Encrypted Data 3.5 Monitoring Stage At the attendance monitoring stage, the system identifies students using presented fingerprint. This is done by going through the process of feature extraction as done in the enrolment module. The features are then used to query the template database to identify the student and ascertain if the student enroll for the course. Subsequently, matching is also carried out during identification and it compresses a decision making module in which the generated match score is used to validate the claimed identity. The flowchart for the authentication module is show in Fig. 7. ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------Amity Journal of Engineering and Technology Vol. 2, No 2
ISSN: 2518-6493 3.6 Template Database A database is an organized collection of related data. It is a collection of data, describing the activities of one or more related systems. In the database design, MySQL database management system is employed. This enables the adoption of database security methodology in storing data. In order to determine the logical structure of a database, data were modeled using relational data model as shown in Fig. 8. A relational model is a conceptual representation of data structures that are required by a database. The information contained in relational model is used to define relational tables, primary and foreign keys, stored procedures, and triggers. Message Digest 5 (MD5) Hashing technique is used in securing access to the database which makes it very difficult for unauthorized user to gain access into the database. Start
Generate key from Template
Scan Student Fingerprint
Identify Fingerprint
Decrypt Subject Info
Mark Student Attendance If identified
Yes No Reject Student/Subject
Stop
Fig. 7. Flowchart for authentication module 3.7 Developed System Class Diagram Object Oriented Analysis and Design (OOAD) approach was used in the design of the system. An OOAD provides a natural and intuitive way to view the software design process—namely, modeling objects by their attributes and behaviors just as human describe real-world objects. The developed system model was implemented using Java technology because of the support Java has for database connectivity. In addition, sun created a standardized interface to databases from Java called Java Database Connectivity (JDBC), which makes it possible to connect a Java application with MySQL database. Using the Connector/J JDBC driver, the system queries the database for data. The system uses two-tier application architecture, commonly called client/server; the client application communicates directly to the database through a JDBC driver. The JDBC API supports two-tier model and database being on the same machine as the client application or on a remote machine, with all communication being handled by JDBC. ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------Amity Journal of Engineering and Technology Vol. 2, No 2
ISSN: 2518-6493
Fig. 8. Database Relational Model The classes modelled for the application and their dependency on each other is shown in Figure 9. The solid line that connects two classes represents an association—a relationship between classes. The numbers near each end of the line are multiplicity values, which indicate how many objects of each class participate in the association. The solid diamonds attached to the association lines of classes indicate composition relationship. Composition implies a whole/part relationship. The class that has the composition symbol (the solid diamond) on its end of the association line is the whole and the classes on the other end of the association lines are the parts. 3.8 Performance Evaluation The developed SAMS performance evaluation was carried out using false rejection rate (FRR) and false accept rate (FAR) as metrics. The test was conducted at different threshold values. Table 1 and Table 2 shows in percentage FRR and FAR values at different threshold values. As depicted in Fig. 10 system false rejection error rate reduces as the threshold is reduced. Also, Fig. 11 shows the plot of FAR over threshold values where 2.00% of subjects were falsely accepted at 100 threshold value. The chances of an impostor to be accepted decreases as the threshold value increases. ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------Amity Journal of Engineering and Technology Vol. 2, No 2
ISSN: 2518-6493
Fig. 9. UML Class dependency Diagram Table-1: Developed System false Rejection Rate Threshold Values 100 200 300 400 500
False Rejection Rate 0.01% 0.03% 0.06% 0.07% 1.80%
1.8 1.6
False Reject Error Rate(%)
1.4 1.2 1 0.8 0.6 0.4 0.2 0 100
150
200
250 300 350 Threshold Value
400
450
500
Fig. 10. False Reject Rate ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------Amity Journal of Engineering and Technology Vol. 2, No 2
ISSN: 2518-6493 Table -2: Developed System false Acceptance Error rate. Threshold Values 100 200 300 400 500
False Acceptance Rate 2.00% 1.80% 1.40% 0.50% 0.20%
2.2 2
False Accept Error Rate(%)
1.8 1.6 1.4 1.2 1 0.8 0.6 0.4 0.2 100
150
200
250 300 350 Threshold Value
400
450
500
Fig. 12. False Accept Rate 4.0 Conclusion This paper presents a secured fingerprint based biometric cryptosystem for attendance monitoring. A total of 500 fingerprints were captured, out of which 300 fingerprints were used for training while 200 fingerprints were used for testing. Minutiae based algorithm was used to extract and select biometric features. Biometric features were further encrypted using Advanced Encryption Standard Algorithm (AES) which results in generating a unique key for each student data. The system was developed and implemented using Java programming language to operate at varying threshold value. Furthermore, system’s performance evaluation was carried out using FRR and FAR as performance metrics. The results for FRR were 0.03%, 0.06%, 0.07%, and 1.80 % at 200, 300, 400 and 500 threshold value respectively while results for FAR were 2.00%, 1.80%, 1.40%, 0.50% and 0.20% at 100, 200, 300, 400 and 500 threshold value respectively.The results showed that using a secured SAMS not only protects attendance information, it also secures other students’ academic records since all AIS subsystem links same back-end facilities. It also pertinent to note, that as the threshold value increases, FAR reduces while FRR increases which is in conformity with other biometric systems. 5.0 References [1]. S. Abuguba, M. M. Milosavljević, and N. Maček, “An Efficient Approach to Generating Cryptographic Keys from Face and Iris Biometrics Fused at the Feature Level,” IJCSNS Int. J. Comput. Sci. Netw. Secur., vol. 15, no. 6, pp. 6– 11, 2015. [2]. J. Han, “Fingerprint Authentication Schemesfor Mobile Devices,” Int. J. Electr. Comput. Eng., vol. 5, no. 3, pp. 579 – 585, 2015. ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------Amity Journal of Engineering and Technology Vol. 2, No 2
ISSN: 2518-6493 [3]. C. O. Akinduyite, A. O. Adetunmbi, O. O. Olabode, and E. O. Ibidunmoye, “Fingerprint-Based Attendance Management System,” J. Comput. Sci. Appl., vol. 1, no. 5, pp. 100–105, 2013. [4]. A. T. Onaolamipo, “Development of A Computerized Biometric Control Examination Screening And Attendance Monitoring System With Fees Management,” vol. 4, no. 6, pp. 76–81, 2014. [5]. M. Sciences, “TOWARDS AN EFFICIENT BIOMETRIC EMPLOYEE ATTENDANCE SYSTEM,” vol. 4, no. 2, pp. 65–78, 2016. [6]. T. Nawaz, S. Pervaiz, and A. Korrani, “Development of Academic Attendence Monitoring System Using Fingerprint Identification,” Int. J. Comput. Sci. Netw. Secur., vol. 9, no. 5, pp. 164–168, 2009. [7]. O. Shoewu, D. Ph, O. A. Idowu, and B. Sc, “Development of Attendance Management System using Biometrics .,” Pacific J. Sci. Technol., vol. 13, no. 1, pp. 300–307, 2012. [8]. S. Rao and P. K. J. Satoa, “An Attendance Monitoring System Using Biometrics Authentication,” Int. J. Adv. Res. Comput. Sci. Softw. Eng. Res., vol. 3, no. 4, pp. 379–383, 2013. [9]. A. Charity, K. Okokpujie, and N. Etinosa, “A Bimodal Biometric Student Attendance System,” in IEEE 3rd International Conference on Electro-Technology for National Development (NIGERCON), 2017, pp. 464–471. [10]. A. K. Jain, A. Ross, and S. Pankanti, “Biometrics: A tool for information security,” IEEE Trans. Inf. Forensics Secur., vol. 1, no. 2, pp. 125–143, 2006. [11]. A. A. Sambo et al., “An RFID-Based Student Information System,” in IEEE 3rd International Conference on ElectroTechnology for National Development (NIGERCON), 2017, pp. 477–482. [12]. S. Shukla, S. Shah, and P. Save, “RFID Based Attendance Management System,” vol. 3, no. 6, pp. 784–790, 2013. [13]. O. k Oyetola, A. A. Okubanjo, M. O. Osifeko, O. I. Sanusi, and R. O. Abolade, “An improved Authentication System using hybrid of biometrics and cryptography,” in IEEE 3rd International Conference on Electro-Technology for National Development (NIGERCON), 2017. [14]. M. S. Al-ani, “A Novel Thinning Algorithm for Fingerprint Recognition,” vol. 2, no. February, pp. 43–48, 2013. [15]. A. K. Jain, A. Ross, and S. Prabhakar, “An Introduction to Biometric Recognition 1,” vol. 14, no. 1, pp. 1–29, 2004.
Author’s Profile O.K Oyetola is a faculty member at the department of Computer and Electrical Engineering, Olabisi Onabanjo University, Nigeria. He received B.Sc. Degree in Electrical and Electronic Engineering from the same University in 2009. In 2016, he completed M.Tech in Electrical and Electronic Engineering at Ladoke Akintola University, Ogbomoso, Nigeria. He is currently working on a PhD research. He is a shrewd academician with interest in Smart grid, Energy management, Software Engineering, Cloud computing, IoT, Big data and pattern recognition. A.A Okubanjo received the B.Sc. Degree in Electrical & Electronics Engineering with First Class Honour from Olabisi Onabanjo University, Nigeria in 2009 and completed the MSc in Control Systems Engineering from HAN University of Applied Sciences, the Netherlands in 2016 and he is presently a PhD student. He is a lecturer in the Department of Computer and Electrical & Electronics Engineering in Olabisi Onabanjo University. His research interests include Control System and Instrumentation, Renewable Energy, Mechatronics, Safety and Systems, Information technology and Telecommunication and Image processing. O.O. Olaluwoye obtained his B.Sc. Degree in Electrical/Electronics Engineering from Olabisi Onabanjo University, Nigeria in 2008. He completed his M.Tech program in Electrical and Electronic Engineering from Ladoke Akintola University of Technology, Ogbomoso, Nigeria in 2016. He is a registered Engineer with the Council of Regulation of Engineering in Nigeria (COREN).
---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------Amity Journal of Engineering and Technology Vol. 2, No 2
ISSN: 2518-6493
Amity Journal of Engineering and Technology (AJET) Editorial Team Prof. (Dr.) Piyush Maheshwari Amity University Dubai, UAE Dr. Vinod Kumar Shukla Amity University Dubai, UAE
Dr. Swaroop Ramaswamy Pillai Amity University Dubai, UAE Reviewers Team
Nguyen Chinh Quang University of Business and International Studies Geneva, Switzerland
Dr. Ishu Sharma Amity University Dubai, UAE
Ms. Reshmi Nair Amity University Dubai, UAE
Dr. Hanan Taleb Associate professor British University in Dubai
Dr Maninder Kaur Amity University Dubai, UAE
Dr. V. ANANTHASWAMY The Madura College (Autonomous), Madurai – 625 011, Tamil Nadu, India.
Dr. Hemant A. Mandave Vice Principal and Professor-Mechanical Engg., KBP Maharashtra, India.
Dr. Hamid Ali Abed Alasadi Basra University, Basra, Iraq
Dr. Bharat M. Shinde Professor and Head, Mechanical Engg., JSPM Technical Campus, Narhe, Pune, Maharashtra, India
DR. Rabindra Kumar Singh Perfumery Analytical Chemist Consultant: GC/MS Expert
Dr. Sandeep Kumar Kautish North West Institute of Engineering & Technology Punjab , India
Dr. Gyanendra Kumar Gupta Director, Dr. Virendra Swarup Group of Institutions, U.P, India
Prof. Khizar Hayat University of Lahore, Pakistan
Prof. Usman Javed University of Lahore, Pakistan
---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------Amity Journal of Engineering and Technology Vol. 2, No 2
ISSN: 2518-6493
Subscription: For subscription to Amity Journal of Engineering and Technology Please contact: Dr. Vinod Kumar Shukla – Journal Coordinator Amity Journal of Engineering and Technology Amity University Dubai (Email:
[email protected],
[email protected]) Manuscript Requirements Manuscripts should be submitted electronically (via e-mail) by sending MS Word File addressed to: The Editor, Amity Journal of Engineering and Technology, Amity University Dubai Email:
[email protected], Phone: +9714 4554 900. Author’s Guidelines AJET is a peer-reviewed, interdisciplinary scientific research journal providing a platform to those who are involved in the research and detailed studies of various disciplines of engineering, technology and allied areas. AJET invites original research paper, reviews, case studies and points of views that are related to engineering, technology and allied areas. The journal aims to provide readers state-ofthe-art development in the field of engineering, technology and related areas through scientific research and lived experience. All submitted articles should report original, previously unpublished research results, experimental or theoretical. All submissions should be made as per the guidelines and manuscript requirements available with Coordinator of AJET. Authors are requested to follow standard IEEE format in all their submissions. Articles shall also not be under consideration elsewhere. It is distinctly understood that all submission are original work of the author(s) and wherever required permissions should be obtained by author(s) by the appropriate authority, before submission. All submissions undergo blind peer review by two or more referees. Usually, the review process takes about two to three months. The reviewer(s) advise the editorial board regarding the merit of articles for publication in the journal. The editor shall inform the corresponding author the status with regard to acceptance or rejection directly or through a member of the editorial board or coordinator of the journal. Wherever modification is required in the submission, the same shall also be communicated to author(s). The author shall make all modifications suggested by the editor and resubmit within two months. Delayed submission after modification, shall result in delayed publication of the article in the journal. Authors are advised to submit high resolution pictures, tables and figures in the standard format separately. Listing of references shall also follow standard IEEE format. A high resolution photograph of the author and author profile (not exceeding 100 words) should also be included. Wherever there are more than one author, authors profile and photographs should be included for each author. The corresponding authors name and email should also be indicated.
---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------Amity Journal of Engineering and Technology Vol. 2, No 2
ISSN: 2518-6493 Prior to publication, authors must sign a form affirming their work is original and is not an infringement of an existing copyright. In all matters relating to appeal and dispute the decision of editor will be final and binding. Additionally authors will submit transfer of copyright to AJET. Authors will receive a PDF offprint and a complimentary copy of the issue in which his/her paper appears. Frequency: Bi-Annual Publication Charge: No publication charge or article processing charge is required. All accepted manuscripts will be published free of cost. Research submission format: Standard IEEE format Initial Paper Submission: Authors are invited to submit their full text papers including conclusions, results, tables, figures and references according to IEEE Paper format. Full text papers will be accepted in only .doc/.docx format by E-mail to:
[email protected],
[email protected]
---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------Amity Journal of Engineering and Technology Vol. 2, No 2
ISSN: 2518-6493
---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------Amity Journal of Engineering and Technology Vol. 2, No 2