Stochastic Biometric System Modelling with Rework Strategy

In this paper, the authors proposed the reliability mathematical modeling of a biometric system that computerizes the whole process of taking attendance and keeping its records in an academic institute. Manually taking attendance and sustaining it for a long time is very difficult as well as wastes a lot of time. For this cause, an efficient system has to be designed. This system takes attendance electronically with the help of a fingerprint scanner, and all the records are saved on a computer server. In order to mark the attendance, student or employee has to place his/her finger on the fingerprint sensor. On proof of identity student’s or employee’s record is well-run in the database, and he/she is reported through liquid-crystal display screens. Here, the authors evaluated reliability measures of the system such as availability, reliability, mean time to failure (MTTF), cost analysis and sensitivity analysis with the help of Laplace transformation, supplementary variable technique, and Markov technique.


Introduction
Biometrics originates from the Greek word bios (life) and metricos (measure) (Schneier, 1999).It is basically a pattern-recognition system that is used to measure and analyze physiological and behavioral features.These features include fingerprints, voice patterns, hand geometry recognition, DNA (deoxyribonucleic acid) identification, gait recognition, signature verification, irises and others (Karray et al., 2007); all are used to identify human characteristics and to verify the identity.These biometrics or characteristics are strongly connected to an individual and cannot be forgotten, communed or simply hacked.These characteristics can uniquely identify a person.Biometrics give us another and higher security compared to password or pin identification.Biometric systems have been widely used for the purpose of recognition.These recognition methods refer to automatic recognition of people based on some definite physiological or behavioral features (Pankanti et al., 2002).There are many biometrics that can be used for some definite systems, but the basic configuration of a biometric system is always same.
Substantiation by biometric verification is becoming more and more mutual in commercial and public security systems, consumer electronics and point of sale applications.Biometric system deals a number of advantages over routine authentication methods (Weaver, 2006).Biometric statistics cannot be acquired by direct covert observation.It is impossible to share and difficult to make a replica.It improves user handiness by alleviating the need to remember long and casual passwords.It shields against denial by the user.Biometrics provide the same level of security for all users different passwords and is highly strong to brute force attacks.Furthermore, biometrics is one of the few methods that can be used for undesirable recognition where the system regulates whether the person is who he or she denies to be.Using biometrics through password-protected smart cards presents all three issues of authentication simultaneously (something you know, something you have and something you are) (Ambalakat, 2005).
Biometric time attendance systems are used to track each and every person coming to the destination is, in fact who one claims to be or not with its time and other detail.It uses finger and face recognition system to authenticate one's identity and record its time-in and time-out with the vital particulars.
For example, all educational institutes have certain measures for students and employees attendance.That is why keeping the correct attendance record is very important.At present, attendance is generally noted using paper sheets and old file system, this methodology is being used for a long time.It becomes very challenging to achieve and bring up-to-date the record frequently and manually analyze the percentage of attendance.Keeping the above facts in mind a system has designed to overcome the problems related to the attendance system (Navaz et al., 2009).

Structure of an Attendance Monitoring System
The attendance monitoring system generally consists of four modules like other biometric systems these are the basic modules of biometric (Ambalakat, 2005) The enrollment unit registers individual student or employee in the biometric system database.During this phase, a biometric reader scans the individual student's or employee's fingerprint to produce its digital representation.

(ii) Feature Extraction Unit
This unit procedure the input sample to produce a compact representation called the template, which is then stored in a central database or a smart card issued to the single student or employee.

(iii) Matching Unit
This unit compares the current input with the template.If the system performs identity verification, it compares the fingerprint to the student's or employee's master template and produces a score or match value (one to one matching).

(iv) Decision Maker
This unit accepts or rejects the student or employee based upon a security threshold and matching score.

Attendance Monitoring System Performance
The performance evaluation of an attendance monitoring system be influenced by on two types of faults-matching errors and acquisition errors (Ambalakat, 2005).The matching errors consist of following: (i) False acceptance Rate (FAR)  Mistaking fingerprint measurements from two dissimilar students or employees to be from the same person.(ii) False rejection Rate (FRR)  Mistaking finger print measurements from the similar student or employee to be from two different persons. The acquisition errors consist of the following.(iii) Failure to Capture Rate (FTC)  Proportion of attempts for which an attendance monitoring system is important to capture a sample of finger print of adequate quality.
(iv) Failure to Enroll Rate (FTE)  Proportion of the student or employee population for which the attendance monitoring system is unable to generate reference templates of sufficient quality. This contains those who, for physical or behavioral reasons like skin problems, are unable to present the finger print.
The entire system is used to compute the accuracy and performance of an attendance monitoring system.Lots of related work exists in the application of different approaches and principles (Shoewu and Idowu, 2012).To effectively monitor the attendance of students or employees, an embedded computer-based lecture attendance management system was proposed by Shoewu and Lawson (2011).A wireless attendance management system that validates using the iris of the individual is used by Kadry and Smaili (2013).Attendance management has also been carried out using attendance software that uses the password for authentication.A system designed and implemented by Cheng et al. (2005) that authenticates the user based on password, this kind of system allows for impression since the password can be shared or tampered with.The password could also be forgotten at times thereby preventing the user from accessing the system.An efficient automatic attendance system using a finger print verification technique has been developed by Saraswat and Kumar (2010).
Other attendance solutions are radio-frequency identification technology: Development (RFID)based student attendance system (Shoewu and Badejo, 2006) and Global System for Mobile communications (GSM) -General Packet Radio Service (GPRS) based student attendance system.These all are device based solutions.GSM-GPRS based systems use position of class for attendance marking, which is not dynamic as if schedule or location of the class changes; wrong attendance might be marked.Similarly, in RFID-based systems, students or employees have to carry RFID cards and also the RFID detectors are needed to be installed (Saraswat and Kumar, 2010).On the basis of previous study, we analyzed that many biometric systems have been developed for monitoring the attendance of students by using finger print verification techniques but no one analyzed reliability measures of the system such as availability, reliability, mean time to failure (MTTF) etc., which are the important aspects of any biometric system.
Observance the above facts in mind in the present paper, we have analyzed an attendance monitoring system for students or employees by using fingerprint recognition technique (Maltoni et al. (2009).A mathematical model for the above stated system has been developed and the reliability measures such as availability, reliability, mean time to failure (MTTF), cost analysis and sensitivity analysis are also evaluated by using Laplace transformation, supplementary variable technique and Markov technique.Although a remarkable work has been done by the various authors (Ram et al., 2008(Ram et al., , 2010(Ram et al., , 2013;;Shoewu and Lawson, 2011;Park and Pham, 2010;Verma et al., 2010) but they did not analyze a biometric system under reliability context.
In this model, we have taken hardware equipment (finger print scanner), n nodes in the series, a switch which is connected to all of the nodes, and these all are connected with the server.The above stated system can completely be failing due to deliberate failure, catastrophic failure, switch failure and failure of all nodes connected in series.We also assumed that the system goes to the degraded state due to partial failure within the system.The general system configuration and working flowchart of a biometric system has been shown in Fig. 1

State Description
The following system states have been designed in the current model: S0 The system is in the good working condition.S1 The system is in the degraded state due to partial failure.

S2
The system is in the degraded state due to partial failure.

S3
The system is in the degraded state due to partial failure.

S4
The system is in the failed due to catastrophic failure.

S5
The system is in the failed state due to switch failure.

S6
The system is in the failed state due to deliberate failure.Sn The system is in the failed state due to failure of n nodes connected in series.

Assumptions and Notations
The following assumptions have been through for the design model: (i) Initially, the system is in the good state.
(ii) The system has three states namely good, degraded, and failed.
(iii) In case of complete failure which can occur due to failure of the total number of nodes connected in parallel, catastrophic failure, switch failure, deliberate failure (iv) All failure and repair rates are constant.(v) System can be repair, when it is in completely failed mode.(vi) The repaired system works like a new one.
The following notations are related to this model:  S0 to S7, where i=0, 1, 2, 3….., 4, 5, 6,   n. ) , ( t x P j The probability density function that the system is in the completely failed state Sj, at epoch t and has an elapsed repair time of x, where j=4, 5, 6, n. n Total number of nodes connected.

Ep(t)
Expected profit during up time.

K1, K2
Revenue and service cost per unit time.

Formulation and Solution of the Mathematical Model
By the probability of the considerations and continuity arguments, we can obtain the following set of differential equations governing the present mathematical model.
The Laplace transformations of the probabilities that the system is in the up (either good or degraded state) and down (failed) state at any time are as follows:     Varying the time scale t from 0 to 15 in Equation ( 36), we obtain Table 1 and correspondingly Fig. 2, representing the behavior of availability of the biometric system with respect to time.

Reliability Analysis
For reliability, taking all repairs rates zero in (34), the reliability expression of the system as: Taking the inverse Laplace of Equation ( 37), we get

Mean Time to Failure (MTTF) Analysis
Taking all repairs to zero Equation (34) as s tends to zero, one can obtain the MTTF as: one by one respectively as 0.1, 0.2, 0.3, 0.4, 0.5, 0.6, 0.7, 0.8, 0.9 in Equation ( 39), one may obtain the variation of MTTF with respect to failure rates as shown in Table 4 and Fig. 5.

Sensitivity Analysis
The sensitivity of the reliability by a fastidious input factor is most regularly defined as the partial derivative of the reliability with respect to that factor.This measure is then used to estimate the outcome of factor changes with the model result without necessitating a full model solution for each factor change (Henley and Kumamoto, 1992;Andrews and Moss, 1993).These input factors are such as, failure rates and component type.Similarly, we can define sensitivity of MTTF w. r. t input factor.

(i) Sensitivity of Reliability
We first perform a sensitivity analysis for changes in R(t) resulting from changes in system parameters   , n=10 taking t=0 to 15 one may obtain Table 5 and Fig. 6.

Results Discussion and Conclusion
In this paper, an attendance monitoring (biometric) system using finger print verification techniques and four types of failures has been considered and reliability measures such as availability, reliability, MTTF, cost analysis and sensitivity analysis have been evaluated.
Availability is the probability that the system is operating satisfactorily at any time it refers to the system survival for the repairable system.The present study revealed that the availability of the biometric system decreases as the time increases and being constant after a certain value of time as shown in Fig. 2.
The probability of the system being in upstate is characterized by the reliability.It refers to the system survival before the first failure.The variation of reliability with respect to time has shown in Fig. 3. From the figure, one can easily observe that the reliability of the biometric system decreases as the time increases.For the safe operation and assure the quality of the components of the system in the sense that they perform their work perfectly, a repairable system should be highly reliable.
Reliability and cost are competing constraints in all manufactured systems.Reliability is essential for achieving a desired level of customer satisfaction.On the other hand, cost control is critical to maintain product reliability.Clearly, reliability alone will not guarantee product viability.Similarly, arbitrary cost cutting can be detrimental to profit when the relating system reliabilities too low.Thus, a comparison between these two factors is necessary to optimize profitability.MTTF refers the expected time of failure during the operation.Variation of MTTF with respect to failure rates has shown in Fig. 5. From the graph, we observe that MTTF of the system decreases with respect to all failure rates that is the time span of failures decreases with increment in failure rates.
The sensitivities of the system reliability with respect to the graph pointed out that MTTF of the system is more sensitive with respect to λ.From the sensitivity analysis, we can conclude that the system can be made less sensitive by controlling its failure rates.
Finally, we concluded upon the basis of the above discussion that a reliable, secure, fast and an efficient biometric system has been developed in place of a manual and unreliable system and we may also predict availability, reliability, failure time and sensitivity of the system.Results have shown that implementation of this biometric system reduce amount of work and time of the administration in an academic institute or any organization.
(a) and (b) respectively.The transition diagram of the system has been shown in Fig. 1(c).

Fig. 4 .
Fig. 4. Expected profit as function of failure rates

Fig. 5 .
Fig. 5. MTTF as a function of failure rates we get the values of sw

Fig. 6 .
Fig. 6.Sensitivity of reliability as function of time (ii) Sensitivity of MTTF Sensitivity analysis for changes in MTTF resulting from changes with the system parameters

Fig. 7 .
Fig. 7. Sensitivity of MTTF as function of failure rates Fig. 4 represents the graph of the cost function versus time.In this figure, we plotted a cost function for different values of cost K1 and K2.From the graph, one can easily observe that increasing service cost leads decrement into expected profit.


are shown in Fig.6.It reveals that the sensitivity of the system decreases with respect to λ and remains constant with respect to the graph, one may easily obtain that system reliability is more sensitive w. r. t.  .Fig .7alsoindicates the sensitivity of MTTF with respect to Unit failure, deliberate failure, catastrophic failure (n nodes) and switch failure rate respectively.
Repair rates from all types of failures respectively.)(tP iTransition state probabilities from state in Equation (37a) and setting time unit t=0 to 15, one can obtain Table 2 and Fig.3, which represents how reliability varies as the time increases.

Table 3 .
Expected profit as function of failure rates

Table 5 .
Sensitivity of reliability as function of time

Table 6 .
Sensitivity of MTTF as function of failure rates