Granthaalayah
DESIGN AND DEVELOPMENT OF A HOSPITAL BIOMETRIC DATA MANAGEMENT SYSTEM

Design and Development of a Hospital Biometric Data Management System

 

Smith Orode Otuagoma 1Icon

Description automatically generated, Ikponmwosa Oghogho 2Icon

Description automatically generated, Ebimene Ezekiel Ebisine 3Icon

Description automatically generated, Okieke Ufuoma Jeffrey 3Icon

Description automatically generated, Uzonna Gabriel Anamonye 4Icon

Description automatically generated, Oyubu Akpovi Oyubu 4Icon

Description automatically generated, Anthony Onoharigho Okpare 4Icon

Description automatically generated, Ogheneakpobo Jonathan Eyenubo 4Icon

Description automatically generated, Gabriel Ilori Efenedo 1Icon

Description automatically generated, Kazeem Ufuoma Okpeki 1, Franklin F. Emefile 5

 

1 Senior Lecturer, Department of Electrical and Electronic Engineering, Delta State University Abraka, Oleh Campus, Delta State, Nigeria

2 Associate Professor, Department of Electrical and Electronic Engineering, Delta State University, Abraka, Oleh Campus, Delta State, Nigeria

3 Lecturer II, Electrical and Electronics Engineering Department, Delta State University Abraka, Oleh campus, Delta State, Nigeria

4 Lecturer I, Department of Electrical and Electronics Engineering Delta State University Abraka, Oleh campus, Delta State, Nigeria

5 Graduate Student, Department of Electrical and Electronic Engineering, Delta State University, Abraka, Oleh Campus, Delta State, Nigeria

 

A picture containing text, sushi, vector graphics, dish

Description automatically generated

A picture containing logo

Description automatically generated

ABSTRACT

The need to drastically reduce the delay faced by patients before they receive treatment in the University Clinic and the need to reduce the occurrence of medical mistakes due to patient’s misidentification led to this work which aimed at developing a hospital biometric data management system.

Java was the programming language of choice and Netbeans was the Integrated Development Environment (IDE) used to design the Graphical User Interphase (GUI) and write codes. For the backend database, MySQL was used for demonstration purposes. The analytical diagrams were drawn using VioletUMLEdit. The Griaule Fingerprint Software Development Kit (SDK) was used to implement the fingerprint capture, enrollment, identification and verification features of the software.

The tests and results obtained showed that with this hospital management system, the time taken to retrieve patient’s record has been reduced from several minutes to less than five seconds thereby eliminating the delay experienced by patients during search of their records. The problem of medical mistakes due to patient’s misidentification was also addressed by the biometric feature of the management system.

 

Received 02 December 2022

Accepted 01 January 2023

Published 16 February 2023

Corresponding Author

Ikponmwosa Oghogho, oghoghoik@gmail.com

DOI 10.29121/IJOEST.v7.i1.2023.464  

Funding: This research received no specific grant from any funding agency in the public, commercial, or not-for-profit sectors.

Copyright: © 2023 The Author(s). This work is licensed under a Creative Commons Attribution 4.0 International License.

With the license CC-BY, authors retain the copyright, allowing anyone to download, reuse, re-print, modify, distribute, and/or copy their contribution. The work must be properly attributed to its author.

 

Keywords: Hospital Biometric, Data Management System, Biometric Feature

 

 

 


 

1. INTRODUCTION

The rapid growth in Information and Communication Technologies (ICTs) has strongly impacted human activities globally including the service delivery models of many organizations with respect to healthcare, businesses, education, governance, etc. Oghogho & Ezomo (2013). As more and more industries embrace the features of ICTs to enhance the way they serve their customers, the healthcare industry is largely affected because effective or ineffective customer service can lead to permanent impairment or even death.

E-Hospital Management Systems provide the benefits of streamlined operations, enhanced administration and control, superior patient care, strict cost control and improved profitability. Balaraman & Kosalram (2013)

Today more hospitals and healthcare systems have migrated to electronic health records, and more health information exchanges are built to coordinate care across various hospitals’ networks. Because of this rapid migration, concerns have been raised about how to effectively manage data integrity to ensure it is kept free from corruption, modification, or unauthorized access. The multiple access to healthcare Electronic Health Records (EHR) and the transition of data across Health Information Exchange (HIEs) open the door to data corruption. In most other industries, data integrity is just as important, but corruption errors can be rectified, and mistakes fixed. However, this can mean the difference between life and death within the healthcare industry.

One of the ways to maintain data integrity is to implement a consistence approach to matching patients with their data across the Health Information Exchanges. That is, as patients’ data transit from one healthcare centre’s network to another, there must be a mechanism to identify a particular patient data before modification can be made and treatment given. Also, personnel attempting to access patients’ health records must provide reliable authentication.

The traditional mechanism of applications requiring the use of a password, pin, ID card, key, or a combination of these might not be too safe today due to increasing global violence and terrorism. In addition, in today’s world where larger amounts of sensitive personal information are stored in databases and accessed in many ways, new methods of identification that significantly reduce the probability of fraud are becoming essential. In addition to this, the Health Insurance Portability and Accountability Act (HIPAA Act) imposes stringent new requirements to protect patient’s privacy and the confidentiality of their information. To provide a reliable way of authenticating hospital personnel, a new solution that utilizes features that are unique to individuals must be implemented. This is the major reason why the health care industry is embracing the biometric technology.

Biometrics can be defined as the development of statistical and mathematical methods applicable to data analysis in the biological sciences Mason et al. (2020). True biometrics systems began to emerge in the late 1900's. This coincided with the emergence of computer systems hence the field experienced an explosion of activities which has made biometrics a part of our normal everyday application today.

The protection of data especially that of patient’s medical records, is of utmost importance. This is implemented by system developers using various methods of authentication. Biometric authentication is synonymous with the way humans identify one another. Biometric systems rely on measurable physiological or behavioral characteristics that can be utilized to identify or verify the identity of an individual. Ahmad et al. (2010)

Ahmad et al. (2012), clarified that physiological-based biometric systems include fingerprints, retina, iris, hand geometry, hand vein etc. These features are consistent on an individual for long periods of time. Unlike the authentication process that involves something one has that can be lost, duplicated, shared, or even altered these features are usually unalterable without causing trauma to the individual.

The versatility of biometric systems is that they not only use physiological human traits but also use the complex and deeply wired behavioral characteristics of humans. These behavioral characteristics are traits that are learned or acquired which later stabilize over a period of time, for example, voice recognition, keystroke dynamics, signature verification etc.

Humans happen to have a built-in "identity card" that differentiates them from one another. This is the fingerprint. No two individuals have exactly the same pattern of fingerprints. The tiny ridges and "valleys" that form the pattern of an individual's fingerprint is an advantageous feature of adaptation. Even though two fingerprints might look identical at first glance, it would not take long before an experienced analyst or an advance piece of software detect the difference in the patterns. This is the basic idea of fingerprint analysis.  

Fingerprint scanners have two jobs: get the image of a fingerprint and determine if the pattern of ridges and valleys of the image matches the pattern of ridges and valleys in pre-scanned fingerprints. There are two main methods of getting the image of fingerprints, and they are optical scanning and capacitance scanning. Both methods get about the same sort of image, but they go about it in completely different ways.

Initially, biometric systems were developed to aid Law Enforcement Agency, like the Police, to identify criminals. However, due to recent advances in biometric systems, increased power and efficiency of computing devices and recent outburst of information security threats, biometric systems have wandered into the physical and logical access control domains.

Biometric systems have a wide range of applications making reference to the Malaysian identity card known as ‘MyKad’ as national initiative deployed by the Malaysian government that incorporates fingerprint biometric to identify a person’s identity and citizenship. In the United States, physical entrances into its nuclear power plants are only granted based on hand geometric recognition. In addition, iris scanning has also been deployed at the United States Office of Legislative Counsel to ensure the confidentiality of its files and documents.

According to Ahmad et al. (2011) although biometric systems have a wide range of applications, different biometric systems basically differ in their underlying technologies, complexities and performances; hence they have their strengths and limitations. Therefore, a detailed study on the trade-offs and risk management is imperative in information security policy and decision making prior to and during the deployment of a biometric solution or other solutions as the case may be.

Data can simply be said to be an organizational asset. In ancient times, the big drivers of the need to keep detailed records were trade and taxation. Basically, people needed to keep track of who owed them, how much and for what. This meant that people not only needed a way of recording, but people also needed a way of retrieving it and updating it. Due to these needs, the development of double entry bookkeeping emerged. With this record keeping was settled, however, retrieving data from numerous books remained a tedious activity. In paper-based systems, indexes were developed to ease and speed up data retrieval process.

The production of reports from stored data was manual, time consuming and error prone, hence major financial reports were scheduled monthly and yearly. On demand reports were completely impossible, and the end of the month and end of the year were usually the busiest periods in the accounts section of an organization.

The development of the computer was a huge step into the digital age as other financial companies began using the computer because data could now be processed with speed, and it was less prone to error. Also reports that were more up to date could be produced. Hard drives and operating systems were introduced, and this allowed multiple users and multiple programs to be active, thereby, removing the tight scheduling due to single process machines. This made it possible to access individual records directly in real time.

Although the present level of database technology ensures that vital information and records in an organization can be effectively stored and quickly retrieved when needed, it is regrettable that many clinics and hospitals in Nigeria, where the storage and retrieval of patients’ record is highly important, still use old models of bookkeeping to store patients’ records. Considerable time is spent in retrieving a patient’s record from the stack of records. It is believed that with the right implementation of modern database technology and software, the time spent in retrieving patients’ records can be considerably reduced to its lowest minimum, hopefully to milliseconds. Today, several organizations are battling issues of fraud, cyber-attacks, and data theft, hence their need to use biometrics to help them protect patient’s data while also safeguarding their reputations. This work is therefore intended to design and develop a robust hospital biometric data management system using Delta State University clinic as a case study so as to protect the privacy of patients’ records by ensuring that only authorized staff can access the data, and to digitize the task of retrieving a patient’s record by deploying database technology and biometrics.

 

2. REVIEW OF PAST WORK

Identification and verification have long been accomplished by showing 'something one has', such as a license or a passport. Sometimes it also requires 'something one knows', such as a password or a PIN. As we live in a time when we need more secure and accurate measures, we begin to look at using 'something one is' which is biometrics. Mason et al. (2020) investigated biometric system alongside the process involved in authentication. In the study, periocular biometrics was used. This approach was integrated with the healthcare system thereby providing an advanced means of securely identifying patients. They proposed a technique to identify humans in hospitals and other healthcare facilities by fusing of periocular biometrics and the electronic master patient index in healthcare information systems. Priya et al. (2016) presented a method to capture, match and verify individuals using feature extraction form the iris and the palm print. The extracted features were compared with database images to obtain matching score which then determined whether the individual is authorized or denied access. In this work, fingerprint biometrics is deployed along with database technology to provide an hospital biometric data management system for Dalta State University, Abraka, Oleh Campus Clinic.

 

 

 

3. MATERIALS AND METHODS

The Hospital Biometric Data Management System required software that will enable authorized hospital staff store and/or access patients’ information. The hospital staff is basically made up of the doctor, the nurses, the record officer, and the pharmacist. Among these various staff, the pharmacist is the only one who does not have the privilege to edit a patient’s records. All the pharmacists can do is access the prescriptions administered by the doctor and give the patient the required drug.

At first, the entire hospital staff will be registered into the system, providing among other things their fingerprints. These fingerprints will be stored in the database and will be used for authenticating any person trying to gain access into the system. This mechanism of authentication will beef up the security of the system, thereby protecting vital patients’ data according to the HIPAA. During the registration of staff, it is very important to state the position of the particular staff (whether a doctor, nurse, record officer or pharmacist) as this will inform the software whether that particular staff can store and access patient’s data or just access it.

To use the software, the staff must be authenticated by the system. The system takes the person’s fingerprint and compares it with pre-scanned fingerprints in the database. If the fingerprint matches one in the database, the system proceeds to ask for the person’s secret password. For the person to gain access into the system, the password the person provides must match the password that corresponds with the fingerprint in the database. This means that the database must contain a staff’s ID, name, password, fingerprint, position, and other data.

A platform is provided on the software for only one administrator for the sake of simplicity and low cost. Vested on the administrator is the power to register staff and also to delete staff in the case of firing a staff or a staff been deceased or retired.

The system administrator is added by a software expert who has the privilege to access the database directly. On the event of someone trying to log into the system, the system first determines whether the person is the admin or a regular staff. If the person is verified to be the admin, the software opens a page different from the one opened for a regular staff because the admin does not have the privilege to add or view patient’s data but can only add or delete staff. Therefore, the software displays a page that basically has two buttons: ADD PERSONNEL and DELETE PERSONNEL. Clicking the ADD PERSONNEL button opens a form to collect the personnel’s data. The form has the same set of three buttons as the form for collecting new patient’s data: CLEAR FORM, SUBMIT and CANCEL.

If the admin clicks the DELETE PERSONNEL button, a table is displayed. The table contains all the personnel that have been registered. Within this table is the option to delete or edit the details of a particular staff.

In this Hospital Management Software, there are five types of users namely: the record officer, the nurse, the doctor, the pharmacist, and the admin. Each user has specific demands of the software.

The record officer uses the software to add new patients, delete patient’s records, edit personal data, retrieve patient’s record, and edit patient’s record. The nurse, on the other hand, uses the software to edit personal data, retrieve patient’s record and edit patient’s record. The admin uses the software to add personnel, delete personnel and edit personal data. The doctor uses the software to add patient, delete patient, edit patient’s records, edit personal data, and view patient’s record whereas the pharmacist can only view patient’s data and edit personal data.

When a patient comes to the clinic, the first staff the patient encounters is the record officer. The record officer ascertains whether the patient is a new or an old patient. If the patient is new, the record officer proceeds to get the patient’s details. Details like surname, first name, sex, age, occupation, local government area, academic session, next of kin, address, and fingerprint.

Upon collecting these data from the patient, the record officer assigns to a patient a reference number (coded form of identity) and gives the patient a clinic card. The record officer and other staff use the reference number to search for the patient’s hospital records.

After the record officer has stored the patient’s data, he creates a Treatment card for the patient. The treatment card normally contains a form on which some of the patient’s data are entered (data like name, address, age, and sex) and a table with two columns- Date and Notes. It is in these columns the doctor fills in the patient’s symptoms, the doctor’s assessment, prescription, and the date of consultation. The record officer attaches a passport photograph of the patient on the treatment card and transfers this treatment card to a nurse. The nurse takes the vital signs of the patient. Vital signs like blood pressure (BP), pulse rate, temperature, weight, and height.

The analysis for the Hospital Management System was done using the Unified Modeling Language (UML). The software used to draw the various UML diagrams is VioletUMLEdit. VioletUMLEdit is free software developed for programmers to aid in the analysis stage of software development. The analysis of the Hospital Management System was done using information gathered from the day to day running operations of the University clinic. The use case diagram of the system is shown in Figure 1 below:

Figure 1

                                    Diagram

Description automatically generated

Figure 1 Use Case Diagrams of the System

 

The UML enables software engineers to model the system structure via class diagrams. A class is modelled in UML with a three compartments rectangle; the top compartment contains the name of the class in bold typeface, the middle compartments contain the attributes of the class (that is, the instance variables of the class) and the bottom compartment holds the behaviours of the class (that is, the methods of the class).

The hospital management system contains the following classes: Staff, Patient, Database Connection, Hospital Database, Login Form, Staff Home, Admin Home. Edit Staff Details Form, All Patients, New Patient Form, Patient Details, New Staff Form, All Staff and Treatment Card.

In UML, instance variables are modelled as attributes and are contained in the second compartment of the class diagrams while methods are modelled as behaviours and are contained in the third compartment of the class diagrams as shown in Figure 2 and Figure 3 respectively.

Figure 2

           

Figure 2 Class Diagrams of Some Classes in the System

 

Figure 3

Figure 3 Class Diagrams of Some Classes in the System

 

In Java, objects are created from classes. Objects from the moment they are created execute some programming steps to accomplish their overall tasks. In UML, activity diagrams show the workflow (i.e., sequence of events) of objects. In Figure 4, Figure 5, Figure 6, Figure 7, Figure 8 are shown the activity diagrams of the various classes in the Hospital Management System.

Figure 4

Figure 4 Activity Diagram of the Login Form

 

Figure 5

Figure 5 Activity Diagram of New Patient Form

 

Figure 6

Figure 6 Activity Diagram of New Staff Form

 

Figure 7

Figure 7 Activity Diagram of Admin Home

 

Figure 8

Figure 8 Activity Diagram of Staff Home

 

In the development of the Hospital Management System, two hardware components and four software components were used. The hardware components are Laptop and Fingerprint Reader (ZK9000) while the software components are Netbeans, MySQL, Phpmyadmin, Griaule SDK and VioletUMLEdit.

The Hospital Management System was developed with a laptop (HP635) on which Java Virtual Machine (JVM) was installed. The JVM enables the laptop to run Java programs. The fingerprint reader (ZK9000) was integrated with the Hospital Management System. It takes the fingerprint of the users of the software. The machine has a USB cable with which it can be connected to the laptop or computer running the software. Netbeans (a Java IDE) was installed on the laptop and used to create the forms in the Hospital Management System. It was also used to write the required java codes for the respective classes or modules as it has various features (color syntaxing, auto-suggestion, blocking of codes, etc) that it uses to make writing codes less tedious and make debugging faster.

MySQL was used as the database for storing the records of patients and other data. MySQL was preferred to other databases because it is free, and it is an open-source database system used by most developers. The MySQL database was connected to the java program through the necessary lines of codes written for that purpose.

The Griaule SDK is the Software Development Kit. It is a library of classes, methods and other programming tools programmers use to develop software hence it was used to integrate the hospital management system with the fingerprint reader. The VioletUMLEdit (a free software used for drawing the diagrams in the UML) was used to draw all the class diagrams and the activity diagrams of all the classes (modules).

The Hospital Database is the database module that holds the records of patients and the credentials of staff used in this system. The Hospital Database contains three tables- patients, staff, and treatment. The patients table holds patients’ records, the staff table holds staffs’ credentials and the treatment table stores treatment schedules for each patient as shown in Figure 9, Figure 10, Figure 11.

Figure 9

                                                                  PatientsTableStructure.JPG

Figure 9 Screen Shot of Patient’s Table in the Hospital Database Module

 

Figure 10

                                                               StaffTableStructure.JPG

Figure 10 Screen Shot of Staff Table in the Hospital Database Module

 

Figure 11

TreatmentTableStructure.JPG

Figure 11 Screen Shot of Treatment Table in the Hospital Database Module

 

The complete Class diagram of the whole Hospital Management System is shown in Figure 12.

Figure 12

Figure 12 Complete Class Diagram of the Whole Hospital Management System

 

There are two basic retrieval modes in the system, they are: Primary key retrieval mode and fingerprint retrieval mode. In the primary key retrieval mode, the software searches for a patient’s record or staff record by using a patient reference number or staff identification number respectively. This mode was implemented by providing a JTextField and JButton components. The user of the software, for instance, a staff trying to search a patient’s record will type in the patient reference number into the JTextField and press the JButton component. On clicking the JButton, the event is handled by grabbing the patient’s reference number and performing a SELECT query to the database.

In the fingerprint retrieval mode, a patient’s record is retrieved from the system database by providing the patient’s fingerprint. Here, the idea is that once the fingerprint reader captures one’s fingerprint, it has four options- enroll, verify, identify, and extract template. These four options are implemented by providing four JButton components. Fingerprint SDK Java application overview is shown in Figure 13

Figure 13

Fingerprint SDK Java Application Overview.JPG

Figure 13 Fingerprint SDK Java Application Overview

 

4. Tests, Results and Discussion

Tests were conducted on the implemented hospital management system to check the results of the written codes and the performance of the software. The test of this software was carried out in the university clinic using sample data of some of the clinic’s patients.

The intentions of the test carried out are: (i) to record the new time taken to store a new patient’s data into the new system, (ii) to record the new time taken to retrieve a patient’s record from the database system both with the fingerprint and the patient reference number, (iii) to check the visual results of the software Graphic User Interface (GUI) codes (iv) to check if the system is 100% percent accurate in retrieving a particular patient’s record and not mistakenly another’s.

The tests carried out are as follows: (i) GUI Display Test (ii) Patient Registration Test (iii) Record Retrieval Test and (iv) Retrieval Accuracy Test.

Samples of some visual results of some modules of the software are shown Figure 14, Figure 15, Figure 16

Figure 14

Login.JPG

Figure 14 Login Form

 

Figure 15

StaffHome.JPG

Figure 15 Staff Home

 

 

Figure 16

EditVitalSigns.JPG

Figure 16 Edit Vital Signs

 

The Patient registration test was carried out to find out the amount of time it will take to register a new patient with the software compared to doing so manually. The results are shown in Table 1

Table 1

Table 1 Patient Registration Test

Expertise

Time taken without software

Time taken with software

Average computer user

≥7mins

≤5mins

Good computer user

≥7mins

≤2mins

 

Table 1 showed that without the use of the software the process of patient registration usually takes seven minutes or above. However, with the use of the software, the time taken depends on the expertise of the staff.

This record retrieval test was carried out to find out the amount of time it will take to retrieve a particular patient’s record with the software compared to doing so manually. The results are shown in Table 2 below:

Table 2

Table 2 Record Retrieval Test

Expertise

Time taken without software (Manually)

Time taken with software

Average computer user

≥5mins

≤5secs

Good computer user

≥5mins

≤5secs

 

Table 2 showed that the amount of time taken to retrieve a patient’s record is tremendously reduced by the software.

The retrieval accuracy test was carried out to find out the accuracy of the software in retrieving the right patient’s records. To perform this test the software was used to search numerous patients’ record with their patient reference numbers and the system gave accurate results. The software has 100% retrieval accuracy.

 

5. Conclusion and Recommendation

The Hospital Biometric Data Management System presented here has obviously reduced the time it takes to register a new patient, retrieve patient’s records, and has improved the accuracy of retrieval of patient and staff data. The first two benefits practically helped in reducing the delay patients face in the clinic and help them to start receiving treatment as soon as possible. The third benefit helped to reduce the problem of medical mistakes; especially medical mistakes due to patient misidentification.

The hospital management system was developed with a two-mode retrieval operation- retrieval based on patient’s reference number and patient’s fingerprint. Both retrieval modes query the database for data using either the patient’s reference number or the patient’s fingerprint. Hence, it was necessary that system has a central data house from where patient’s data can be fetched. And each patient’s data has been associated with the patient’s reference number and the patient’s fingerprint.

The system was built to be compatible with major fingerprint readers. This was made possible by using Griaule Fingerprint SDK. It was necessary that the system runs with major fingerprint readers so that the university clinic does not have to worry about which fingerprint reader to use with the system.

Future development of this system should focus on the following: (i) development of a mobile application for this system so that the patient can be reminded about their prescription in whatever the patient’s location, their appointments with the doctor and other relevant details the patient needs to be reminded about (ii) development of a version of this system that will have internet compatibility so that patients’ records can be securely transferred between various medical centres (iii) Development of a version that will add the feature of billing in the hospital management system, so that patients can be billed through the software, and can also pay by using their credit cards.

 

CONFLICT OF INTERESTS

None.  

 

ACKNOWLEDGMENTS

None.

 

REFERENCES

Ahmad, S. M. S., Ali, B. M., & Adnan, W. A. W. (2012). Applications as Access Control Tools of Information Security. International Journal of Innovative Computing Information and Control, 8(11), 7983–7999.

Ahmad, S. M. S., Shakil, A., Faudzi, M. A., & Anwar, R. M. (2010). Analysis of “Goats” within User Population of an Offline Signature Biometrics. In Proceedings of the of the 10th International Conference of Information Science. Signal Processing and Applications, 765–769. https://doi.org/10.1109/ISSPA.2010.5605415.

Balaraman, P., & Kosalram, K. (2013). E-Hospital Management and Hospital Information Systems- Changing Trends. International Journal of Information Engineering and Electronic Business, 5(1), 50–58. https://doi.org/10.5815/ijieeb.2013.01.06.  

Mason, J., Dave, R., Chatterjee, P., Graham-Allen, I., Esterline, A., & Roy, K. (2020). An Investigation of Biometric Authentication in the Healthcare Environment. Array. Elsevier, 8. https://doi.org/10.1016/j.array.2020.100042.

Oghogho, I., & Ezomo, P. I. (2013). ICT for National Development in Nigeria : Creating an Enabling Environment. International Journal of Engineering and Applied Sciences, 3(2), 59–66.

Prabhakar, S., Pankanti, S., & Jain, A. K. (2003). Biometric Recognition : Security and Privacy Concerns. IEEE Security and Privacy, 1(2), 33–42. https://doi.org/10.1109/MSECP.2003.1193209.

Prasad, N. R. K., & Rajesh, A. (2012). RFID-Based Hospital Real Time Patient Management System. International Journal of Computer Trends and Technology, 3(3), 509–517. https://doi.org/10.1109/ICIS.2007.159.

Priya, J., Alad, A., & Manoj, P. M. E. (2016). Fusion of Palm Print and Iris for Multimodal Biometric Recognition. International Journal of Scientific and Research Publications, 6(5).

Thomas, M. (2004). Is Malaysia's MyKad the 'One Card to Rule Them All’ ? The Urgent Need to Develop a Proper Legal Framework for the Protection of Personal Information in Malaysia ? Melbourne University Law Review, 28(2), 474–551.

     

 

 

 

 

 

 

Creative Commons Licence This work is licensed under a: Creative Commons Attribution 4.0 International License

© Granthaalayah 2014-2023. All Rights Reserved.