SlideShare a Scribd company logo
1 of 6
Download to read offline
International Educational Applied Scientific Research Journal
ISSN (Online): 2456-5040
Volume: 1 | Issue: 1 | October 2016
30
AVL TREE AN EFFICIENT RETRIEVAL ENGINE IN CLASSIFIED
FINGERPRINT DATABASE
Ahmed B. Elmadani
Department of Computer Science, Faculty of Science, Sebha University
ABSTRACT
Fingerprints are used to identify human and for crime discover. They are used to authenticate persons in order to allow them to
gain access to their financial and personal resources or to identify them in big databases. This requires use of fast search engine
to reduce time consumed in searching big fingerprint databases, there for choosing searching engine is an important issue to
reduce searching time. This paper investigates the existing searching engine methods and presents advantages of AVL tree
method over other methods. The paper will investigate searching speed and time consuming to retrieve fingerprint image.
Experiment shows use of AVL tree is the best searching algorithm.
Key Words: Fingerprint Databases, fingerprint classifies, AVL tree, Access Methods Algorithms.
1. INTRODUCTION
Fingerprints have been used as the most popular biometric
authentication and verification measure because of their high
acceptability [15], immutability and uniqueness [1].
Fingerprint consists of a pattern of interleaved ridges and
valleys [2]. There for they are used in differentiating people
[10]. Fingerprint classification is a technique to assign a
fingerprint into one of the several pre-specified types or classes
namely, whorl, right loop, left loop, arch, and tented arch [8].
Fingerprint has two main types of features says [9]:
1. Global ridge and furrow structures which form special
pattern in central region of the fingerprint, and
2. Local ridge and furrow minute details.
Fingerprint classification is based on only the first type of
features and uniquely identified based on the second type of
features, such features are ridge endings, bifurcation known as
minutiae, orientation field and singular points in a fingerprint
image [9][10].
Data whatever it is must first be sorted to facilitate searching
and make it easy for any retrieval, so far different sorting
methods are invented, among those methods or algorithms
Bubble sort, Merge sort, Insertion sort, Selection sort, Quick
sort and tree based algorithms[11].
Data when it stored in a big store, searching in it becomes a
difficult task and time consume especially when it became
grows [10], searching methods known also as accessing
methods in computer science. Many advanced algorithms and
data structures have been devised for the sole purpose of
making accessing more efficient, therefore there is possibility
to use them in retrieving biometrics images from its big
database [12].
Access methods in literature are, sequential (Queue), binary,
graph and tree based search algorithms, in practical they are
vary in their suitableness, means for each type of task a
particular algorithm is used, because some are slow other are
fast so selection is made on the type of use [11].
Graph search it is a traversal technique visits every node
exactly one in a systematic fashion. The search process in a
graph can be seen as applying a set of operators to the graph’s
nodes until the goal node is found it initially defines the start
node. Therefore, there is a general approach, applicable for
any graph search, following the constraints. Two standard
graph search techniques have been widely used, Depth-First
Search (DFS) and Breadth-First Search (BFS) [11].
SQL search a structured query language (SQL) search, is a
special-purpose designed for getting information from and
updated database. It searches data in a relational database
management system (RDBMS), or for stream processing in a
relational data stream management system (RDSMS) [12].
Hash access method, data is stored in an extended linear hash
table. The key and the data used for Hash records can be of
arbitrarily complex data. Duplication of records is optionally
supported in this method [16].
Queue access method it is similar to what known as sequential
access method, data are stored in a queue as fixed-length
records. Each record uses a logical record number as its key.
This access method is designed for fast inserts at the tail of the
queue, and it has a special operation that deletes and returns a
record from the head of the queue. This access method is
unusual in that it provides record level locking.
This can provide beneficial performance improvements in
applications requiring concurrent access to the queue [12].
Tree based search algorithms consist of trees, they are used in
computer to represent algebraic formula, as an efficient method
for searching large databases, dynamic lists, and diverse
International Educational Applied Scientific Research Journal
ISSN (Online): 2456-5040
Volume: 1 | Issue: 1 | October 2016
31
applications. A tree consists of a finite set of elements, called
nodes. Trees can be represented generally in which each node
can have an unlimited out-degree and binary tree in which no
node have more than two sub-trees [4].
A binary tree is a method of placing and locating files (called
records or keys) in a database, especially when all the data is
known to be in random access memory (RAM) [13].
Adelson Velskii and Landis
(AVL) tree is one of this implementation[6]. It is
implementation of binary tree, for each node in the tree, the
height of its left sub-tree differs from the height of its right sub-
tree by no more than 1 [6]. The AVL Tree ensures that al
operations can be performed in time logarithmic in the size of
the tree [7]. The AVL Tree must meet strict balance
requirements to maintain is O (log n) search capabilities [14],
which is resulted in search time reduction [5].
As we seen there are different searching algorithms, in this
research an experiment of retrieving fingerprint image based
on its class will applied using different searching algorithms to
select a suitable and fast search method as continuation of an
algorithm written by [10], the following paragraphs will
discuss used algorithm.
To choose one of available access method for small working
datasets that fit entirely in memory, there is no difference
between Binary Tree and Hash. Both will perform just as well
as the other says [16]. Binary Tree can be used if keys have
some locality of reference where Hash can be used when a
dataset is extremely large. Moreover, if your dataset becomes
so large that database will almost certainly have to perform disk
I/O to satisfy a random request, then Hash will definitely
outperform Binary Tree because it has fewer internal records
to search through than does Binary Tree [11].
Next paragraphs will propose an algorithm uses different
access method to retrieve information from a data base consists
of information collected from fingerprint images.
2. METHODOLOGY
The following paragraphs will describe the proposed
algorithm, experiment, obtained results and their analysis. The
proposed algorithm can be summarized in two points as
following:
2.1 Fingerprint database construction
a. Fingerprint image collection and image preparation
b. Fingerprint image class assigning
c. Fingerprint feature extraction
d. Fingerprint key (FPkey) calculation from features
e. Store FPkey in index file and Fingerprint image in
database.
2.2 Searching algorithms
a. Follow the points from section 2.1 (a to d).
b. Search from image using FPkey Apply different
algorithms.
c. Write obtained results for different search algorithms
d. Analysis results.
2.3 Fingerprint database construction
A description of a fingerprint database image collection and
preparation for farther use will be given in the following
paragraphs.
2. 3.1 Data collection
Used Database contains about 10000 fingerprint images known
as fdb10k is used. The fdb10k is a collection of fingerprint
images that collected from internet FVC2000 combined with
other captured locally from student and from staff.
2.3.2 Image preparation
Fingerprint image as any image must be filtered to remove
noise and resized. Winner filter was used to remove noise then
each image was resized to 200x200 pixels. Sorting is beyond
our research but a quick sort algorithm is used because it fast
compared with other method and also suitable for this type of
data.
2.4 Fingerprint image class assigning
Each fingerprint image before storing it in database, it has to
assign one of the five classes by following an algorithm
described in [10] which is based on finding the singular points
of the fingerprint image. An image of the fingerprint will be
stored to its database class and this will facilitate fatherly
searching process. Nine thousand five hundred and eighty one
(9581) fingerprint images are used in classification process.
Result of applying mentioned algorithm is shown in Table 1.
1996 as Arch, 989 as Tented arch, 2663 as Left Loop, 685 as
Right Loop, and 3248 as Whorl.
Table 1: Classification result of the collected fingerprint
images
Total A T LL RL W
9581 1996 989 2663 685 3248
2.5 Fingerprint feature extraction
A procedure was written in C++ language to extract feature
from fingerprint images. Calculated features are mean denoted
by Mean equation (1), standard division denoted by Std-div
equation (2) and variance denoted by Var equation (3), used
formulas are shown below:
International Educational Applied Scientific Research Journal
ISSN (Online): 2456-5040
Volume: 1 | Issue: 1 | October 2016
32
Mean = 
MN
ji
jiI
,
,
),( (1)
where ni ....3,1,0 , 135,90,45,0 , iI sector in
image  , and iM Mean of pixel value in iI .
Std-div =
2
)),((  ii MeanyxI  (2)
where ni ....3,1,0 , 135,90,45,0 , iI sector in
image  , and iM Mean of pixel value in iI .
Var =  
MN
ji
MeanjiI
,
,
)),(( (3)
2.6 Fingerprint key (FPkey)
The FPkey is a fingerprint key that calculated using the formula
(4) to be use as a unique key for retrieving the requested
fingerprint image
)(
)10*10*10*( 210
fprINTFPkey
VardivStdMeanabsfpr

 
(4)
2.7 FPkey field as index of Fingerprint image
As mentioned above The FPkey field to be a unique key as
shown in Table 2. It is used in searching an indexed file, where
the class is used to indicate the database in which the
fingerprint image can be find. By using the index file's FPkey
it will be easy to find the image name as shown in Table 3.
Fingerprint databases consist of five separate file each contains
one of mentioned is class, 1 for Arch database, 2 for Tented
arch database, 3 for Left Loop database, 4 for Right Loop
database, and 5 for Whorl database.
Table 2: FPkey index file class retrieval
No. FPkey Class
1 113530 1
2 410118 4
3 410207 4
Table 3: FPkey index file image retrieval
No. FPkey Image name
1 113530 A20
2 410118 R6000
3 410207 R6020
2.8 Fingerprint image searching in classified Fingerprint
database
Designing Databases with separate classes will minimize
searching time, because each will contain less number of
images and only a signal class compared to whole databases.
When a fingerprint image is searched, it switched to different
search engines each engine uses a search method different to
the other based on that a fast searching method will be discover.
An experiment was taken place by selecting several access
methods Queue, Graph, SQL, Hash, Binary, and AVL tree as
will be described in next sections.
2.9 Results for different Access algorithms
An experiment of retrieving fingerprint image was performed
using Dual-Core CPU, HDD 500GB, and 4 GB RAM. First
only 100 fingerprints for each class were used, it shows delay
in queue method where AVL tree is the fastest specially in
retrieving a left loop (LL) fingerprint class. Chart – 1, Shows
results of the performed experiment.
Chart – 1: Time retrieval from 100 Fingerprint Database
Another experiment was performed to retrieve fingerprint
images from databases based on using big amount of
fingerprints starting from 100 to ≈10000 using a single access
methods to discover which the fastest method, used method are
Queue, Graph, SQL, Hash, Binary Tree, and AVL tree
Time retrieve for different Class based on single access
method, experiment using a binary tree as retrieved algorithm,
it shows that the arch class is fastest in retrieving were whorl is
the slowest. Char – 2, shows results of using binary tree in
retrieving fingerprint class.
0
0.05
0.1
0.15
0.2
0.25
0.3
0.35RetrivalTime
Used Access Methods
100 Fingerprint Database
A
T
LL
RL
W
International Educational Applied Scientific Research Journal
ISSN (Online): 2456-5040
Volume: 1 | Issue: 1 | October 2016
33
Chart – 2: Results of testing binary tree
Then another experiment of retrieving fingerprint from
database using graph method shows that Tarch is the fastest
were arch is the slowest. Chart – 3, shows results of using
graph in retrieving fingerprint class.
Chart – 3: Results of testing graph method
Same experiment was carried using SQL and hash which
shows that retrieving arch is the fastest, were in using AVL tree
retrieving lift loop is the fastest. Chart – 4, shows experiment
of using SQL, Chart – 5, shows experiment of using Hash and
Chart – 6, shows experiment AVL tree.
Chart – 4: Results of testing SQL method
Chart – 5: Results of testing Hash method
Chart – 6: Results of testing AVL tree method
An experiment also carried with use of different access method
to retrieve a signal fingerprint class. In the experiment six
access methods are used they are queue, sql, graph, binary tree,
hash and AVL tree. In this experiment as shown in Chart – 7,
AVL tree scores fastest in retrieving a Tarch class were queue
is the slowest.
Chart – 7: Time retrieve for Tarch Class using different
access methods
0
0.1
0.2
0.3 100
300
700
1500
3000
7000
≈10000
RetrivalTime
Number of Fingerprints
Binary Tree Access Method
A
T
L
L
R
L
0.24
0.25
0.26
0.27
0.28
RetrivalTime
Number of Fingerprints
Graph Access Method
A
T
LL
RL
W
0
0.1
0.2
0.3
0.4
0.5
100
300
700
1500
3000
7000
≈10000
RetrivalTime
Number of Fingerprints
SQL Access Method
A
T
LL
RL
W
0
0.05
0.1
0.15
0.2
0.25
100
300
700
1500
3000
7000
≈10000
RetrivalTime
Number of Fingerprints
AVL Tree Access Method
A
T
LL
RL
W
0
0.5
1
1.5
2
100
300
700
1500
3000
7000
≈10000
Timeretrive
Number of Fingerprints
Tarch Database
Queue T
SQL T
Graph T
Bin Tree T
Hash T
AVL tree T
0
0.1
0.2
0.3
0 5000 10000 15000
RetrivalTime
Number of Fingerprints
Hash Access Method
A T LL RL W
International Educational Applied Scientific Research Journal
ISSN (Online): 2456-5040
Volume: 1 | Issue: 1 | October 2016
34
Same experiment was repeated using arch class, whorl class,
right loop class it shows that AVL tree is the fastest where
queue the lowest. Chart - 8, Chart - 9 and Chart - 10, show that
AVL tree always the fastest and queue is the slowest. Figures
also shows that other methods still can be used but when a
discussion is concerned to the accessing of information in
database minimum time is preferred. So use of AVL tree for
this type of data is best solution.
Chart – 8: Time retrieve for Arch Class using different
access methods
Chart – 9: Time retrieve for whorl Class using different
access methods
Chart 10: Time retrieve for Right Loop Class using different
access methods
2.10 Results Analysis
Results show an importance of separating fingerprint class in
minimizing searching databases and in time retrieval. This fact
was noted at pre-tests of the proposed algorithm. The AVL tree
because it adjust it salve after any insertion or deletion so it can
easily access any particular information in the given database,
this gives it an advantage even with binary tree that share some
similarity specially when a small set of item are used as shown
in charts Chart - 8, Chart - 9, and Chart - 10. The queue
method is not suitable for this type of data so it scores a big
retrieval time even with small set database as shown in
mentioned figures. Table 4, shows access time that scored from
different used access method and it shows that AVL tree is the
fastest among all.
Table 4: Average access time using different fingerprint
databases
3 CONCLUSION
This work shows a model of how fingerprint can be classified
in database based on class, and then uses several methods to
retrieve them. The work proves that an AVL tree is the fastest
access and retrieval method not only for fingerprint class but it
works effectively for any type of data.
0
0.5
1
1.5
2
RetriveTime
Number of Fingerprints
Arch Database
Queue A
SQL A
Graph A
Bin Tree
A
Hash A
0
0.5
1
1.5
2
RetriveTime
Number of Fingerprints
Whorl Database
Queue W
SQL W
Graph W
Bin Tree W
Hash W
0
0.5
1
1.5
2
2.5
RetriveTime
Number of Fingerprints
Right Loop Database
Queue RL
SQL RL
Graph RL
Bin Tree RL
Hash RL
AVL tree RL
Data Base
Access method
Avg.
100
Avg.
1500
Avg.
≈10000
Graph 0.25 0.255 0.262
Hash 0.19 0.233 0.247
Bin Tree 0.214 0.240 0.251
AVL tree 0.16 0.166 0.176
SQL 0.21 0.32 0.39
Queue 0.32 0.35 0.46
International Educational Applied Scientific Research Journal
ISSN (Online): 2456-5040
Volume: 1 | Issue: 1 | October 2016
35
REFERENCES
[1] M. H. Bhuyan, S. Saharia, and D. K. Bhattacharyya, “An
Effective Method for Fingerprint Classification” International
Arab Journal of e-Technology, Vol. 1, No. 3. 2010.
[2] R. J. Tom1 and T. Arulkumaran, “ Fingerprint Based Gender
Classification Using 2D Discrete Wavelet Transforms and
Principal Component Analysis” International Journal of
Engineering Trends and Technology- Vol.4 Issue 2. 2013.
[3] S. Gagandeep and O. Jasuja “Latent Fingerprint Development”
Dye formulations LAP LAMBERT Academic Publishing. 2012.
[4] R. F. Giberg and B. A. Forouzan, “Data Structures A
Pseudocode approach with C++”, Brooks/Cole, USA. 2001.
[5] Blieberger, “Discrete Loops and Worst Case Performance,
Computer Languages”, Vol. 20, No. 3, (pp. 193-212).1994.
[6] M. Medidi and D. Deo “Parallel dictionaries on AVL trees”,
Eighth International Parallel Processing Symposium
Proceedings. (pp. 878 –882). 1994.
[7] K. S. Larsen “AVL trees with relaxed balance Eighth
International Parallel Processing Symposium Proceedings. (pp.
888 –893). 1994.
[8] D. Maio and D. Maltoni ”A Structural Approach to Fingerprint
Classification”, in proceedings 13th ICPR, Vienna. Vol. 3. (pp.
578 –585). 1996.
[9] K. Jain, S. Prabhakar and L. Hong “A multichannel approach
to fingerprint classification” IEEE Transactions on Pattern
Analysis and Machine Intelligence.Vol.21 Issue: 4. (pp. 348 –
359). 1999.
[10] B. Elmadani “Classification of Fingerprints based on Singular
Points” Applied Science journal Sebha University. Vol. 8. No.
1. 2015.
[11] N. Thomas “Sorting and Searching Algorithms: A Cookbook”.
At http://members.xoom.com/thomasn/s_man.htm. Accessed
1.1. 2016.
[12] H. Feng, D. John and Z. S. Piotr “ A Fast Search Algorithm for
a Large Fuzzy Database” IEEE Transactions on Information
Forensics and Security, Vol. 3, No. 2, June 2008.
[13] R. Chadha, R. Misal and T. Mokashi “Modified Binary Search
Algorithm” International Journal of Applied Information
Systems (IJAIS) – ISSN : 2249-0868 Foundation of Computer
Science FCS, New York, USA Vol. 7. No. 2. 2014.
[14] B. Elmadani and V. Prakash “New Technique in
Fingerprint Matching based on An-AVL tree Search
algorithm” Journal of Technology and commerce Brunei
Darussalam. Vol 4. No. 1. 2006.
[15] R. J. Tom, T. Arulkumaran and M. E. Scholar “Fingerprint
Based Gender Classification Using 2D Discrete Wavelet
Transforms and Principal Component Analysis” International
Journal of Engineering Trends and Technology- Vol.4 No. 2.
2013.
[16] Introduction To Electrical Engineering and computer Science
http://ocw.mit.edu/courses/electrical-engineering-and
computer-science/6-01sc-introduction-to-electrical-
engineering-and-computer-science-i-spring-2011/unit-4-
probability-and-planning/optimizing-a-search/ 2011. Accessed:
1.6.2016.

More Related Content

What's hot

Analysis on different Data mining Techniques and algorithms used in IOT
Analysis on different Data mining Techniques and algorithms used in IOTAnalysis on different Data mining Techniques and algorithms used in IOT
Analysis on different Data mining Techniques and algorithms used in IOTIJERA Editor
 
An improved apriori algorithm for association rules
An improved apriori algorithm for association rulesAn improved apriori algorithm for association rules
An improved apriori algorithm for association rulesijnlc
 
QUERY OPTIMIZATION IN OODBMS: IDENTIFYING SUBQUERY FOR COMPLEX QUERY MANAGEMENT
QUERY OPTIMIZATION IN OODBMS: IDENTIFYING SUBQUERY FOR COMPLEX QUERY MANAGEMENTQUERY OPTIMIZATION IN OODBMS: IDENTIFYING SUBQUERY FOR COMPLEX QUERY MANAGEMENT
QUERY OPTIMIZATION IN OODBMS: IDENTIFYING SUBQUERY FOR COMPLEX QUERY MANAGEMENTcsandit
 
Ba2419551957
Ba2419551957Ba2419551957
Ba2419551957IJMER
 
A NOVEL DATA DICTIONARY LEARNING FOR LEAF RECOGNITION
A NOVEL DATA DICTIONARY LEARNING FOR LEAF RECOGNITIONA NOVEL DATA DICTIONARY LEARNING FOR LEAF RECOGNITION
A NOVEL DATA DICTIONARY LEARNING FOR LEAF RECOGNITIONsipij
 
Ijarcet vol-2-issue-7-2341-2343
Ijarcet vol-2-issue-7-2341-2343Ijarcet vol-2-issue-7-2341-2343
Ijarcet vol-2-issue-7-2341-2343Editor IJARCET
 
Header Based Classification of Journals Using Document Image Segmentation and...
Header Based Classification of Journals Using Document Image Segmentation and...Header Based Classification of Journals Using Document Image Segmentation and...
Header Based Classification of Journals Using Document Image Segmentation and...CSCJournals
 
An investigative scheme for keyword search using inverted key tactic
An investigative scheme for keyword search using inverted key tacticAn investigative scheme for keyword search using inverted key tactic
An investigative scheme for keyword search using inverted key tacticeSAT Publishing House
 
Query optimization in oodbms identifying subquery for query management
Query optimization in oodbms identifying subquery for query managementQuery optimization in oodbms identifying subquery for query management
Query optimization in oodbms identifying subquery for query managementijdms
 
data_analytics_2014_5_30_60155
data_analytics_2014_5_30_60155data_analytics_2014_5_30_60155
data_analytics_2014_5_30_60155Neil Dahlqvist
 
Development of pattern knowledge discovery framework using
Development of pattern knowledge discovery framework usingDevelopment of pattern knowledge discovery framework using
Development of pattern knowledge discovery framework usingIAEME Publication
 
Spectral Clustering and Vantage Point Indexing for Efficient Data Retrieval
Spectral Clustering and Vantage Point Indexing for Efficient Data Retrieval Spectral Clustering and Vantage Point Indexing for Efficient Data Retrieval
Spectral Clustering and Vantage Point Indexing for Efficient Data Retrieval IJECEIAES
 
Privacy Preserving MFI Based Similarity Measure For Hierarchical Document Clu...
Privacy Preserving MFI Based Similarity Measure For Hierarchical Document Clu...Privacy Preserving MFI Based Similarity Measure For Hierarchical Document Clu...
Privacy Preserving MFI Based Similarity Measure For Hierarchical Document Clu...IJORCS
 
Subgraph relative frequency approach for extracting interesting substructur
Subgraph relative frequency approach for extracting interesting substructurSubgraph relative frequency approach for extracting interesting substructur
Subgraph relative frequency approach for extracting interesting substructurIAEME Publication
 
Scalable and efficient cluster based framework for
Scalable and efficient cluster based framework forScalable and efficient cluster based framework for
Scalable and efficient cluster based framework foreSAT Publishing House
 
Scalable and efficient cluster based framework for multidimensional indexing
Scalable and efficient cluster based framework for multidimensional indexingScalable and efficient cluster based framework for multidimensional indexing
Scalable and efficient cluster based framework for multidimensional indexingeSAT Journals
 
Generic Algorithm based Data Retrieval Technique in Data Mining
Generic Algorithm based Data Retrieval Technique in Data MiningGeneric Algorithm based Data Retrieval Technique in Data Mining
Generic Algorithm based Data Retrieval Technique in Data MiningAM Publications,India
 
Data stream mining techniques: a review
Data stream mining techniques: a reviewData stream mining techniques: a review
Data stream mining techniques: a reviewTELKOMNIKA JOURNAL
 

What's hot (20)

Analysis on different Data mining Techniques and algorithms used in IOT
Analysis on different Data mining Techniques and algorithms used in IOTAnalysis on different Data mining Techniques and algorithms used in IOT
Analysis on different Data mining Techniques and algorithms used in IOT
 
An improved apriori algorithm for association rules
An improved apriori algorithm for association rulesAn improved apriori algorithm for association rules
An improved apriori algorithm for association rules
 
QUERY OPTIMIZATION IN OODBMS: IDENTIFYING SUBQUERY FOR COMPLEX QUERY MANAGEMENT
QUERY OPTIMIZATION IN OODBMS: IDENTIFYING SUBQUERY FOR COMPLEX QUERY MANAGEMENTQUERY OPTIMIZATION IN OODBMS: IDENTIFYING SUBQUERY FOR COMPLEX QUERY MANAGEMENT
QUERY OPTIMIZATION IN OODBMS: IDENTIFYING SUBQUERY FOR COMPLEX QUERY MANAGEMENT
 
Ba2419551957
Ba2419551957Ba2419551957
Ba2419551957
 
A NOVEL DATA DICTIONARY LEARNING FOR LEAF RECOGNITION
A NOVEL DATA DICTIONARY LEARNING FOR LEAF RECOGNITIONA NOVEL DATA DICTIONARY LEARNING FOR LEAF RECOGNITION
A NOVEL DATA DICTIONARY LEARNING FOR LEAF RECOGNITION
 
Fp3111131118
Fp3111131118Fp3111131118
Fp3111131118
 
Ijarcet vol-2-issue-7-2341-2343
Ijarcet vol-2-issue-7-2341-2343Ijarcet vol-2-issue-7-2341-2343
Ijarcet vol-2-issue-7-2341-2343
 
Header Based Classification of Journals Using Document Image Segmentation and...
Header Based Classification of Journals Using Document Image Segmentation and...Header Based Classification of Journals Using Document Image Segmentation and...
Header Based Classification of Journals Using Document Image Segmentation and...
 
An investigative scheme for keyword search using inverted key tactic
An investigative scheme for keyword search using inverted key tacticAn investigative scheme for keyword search using inverted key tactic
An investigative scheme for keyword search using inverted key tactic
 
Query optimization in oodbms identifying subquery for query management
Query optimization in oodbms identifying subquery for query managementQuery optimization in oodbms identifying subquery for query management
Query optimization in oodbms identifying subquery for query management
 
data_analytics_2014_5_30_60155
data_analytics_2014_5_30_60155data_analytics_2014_5_30_60155
data_analytics_2014_5_30_60155
 
Development of pattern knowledge discovery framework using
Development of pattern knowledge discovery framework usingDevelopment of pattern knowledge discovery framework using
Development of pattern knowledge discovery framework using
 
Spectral Clustering and Vantage Point Indexing for Efficient Data Retrieval
Spectral Clustering and Vantage Point Indexing for Efficient Data Retrieval Spectral Clustering and Vantage Point Indexing for Efficient Data Retrieval
Spectral Clustering and Vantage Point Indexing for Efficient Data Retrieval
 
Privacy Preserving MFI Based Similarity Measure For Hierarchical Document Clu...
Privacy Preserving MFI Based Similarity Measure For Hierarchical Document Clu...Privacy Preserving MFI Based Similarity Measure For Hierarchical Document Clu...
Privacy Preserving MFI Based Similarity Measure For Hierarchical Document Clu...
 
Subgraph relative frequency approach for extracting interesting substructur
Subgraph relative frequency approach for extracting interesting substructurSubgraph relative frequency approach for extracting interesting substructur
Subgraph relative frequency approach for extracting interesting substructur
 
50120130405020
5012013040502050120130405020
50120130405020
 
Scalable and efficient cluster based framework for
Scalable and efficient cluster based framework forScalable and efficient cluster based framework for
Scalable and efficient cluster based framework for
 
Scalable and efficient cluster based framework for multidimensional indexing
Scalable and efficient cluster based framework for multidimensional indexingScalable and efficient cluster based framework for multidimensional indexing
Scalable and efficient cluster based framework for multidimensional indexing
 
Generic Algorithm based Data Retrieval Technique in Data Mining
Generic Algorithm based Data Retrieval Technique in Data MiningGeneric Algorithm based Data Retrieval Technique in Data Mining
Generic Algorithm based Data Retrieval Technique in Data Mining
 
Data stream mining techniques: a review
Data stream mining techniques: a reviewData stream mining techniques: a review
Data stream mining techniques: a review
 

Similar to AVL TREE AN EFFICIENT RETRIEVAL ENGINE IN CLASSIFIED FINGERPRINT DATABASE

Hadoop Map-Reduce To Generate Frequent Item Set on Large Datasets Using Impro...
Hadoop Map-Reduce To Generate Frequent Item Set on Large Datasets Using Impro...Hadoop Map-Reduce To Generate Frequent Item Set on Large Datasets Using Impro...
Hadoop Map-Reduce To Generate Frequent Item Set on Large Datasets Using Impro...BRNSSPublicationHubI
 
IRJET- Data Mining - Secure Keyword Manager
IRJET- Data Mining - Secure Keyword ManagerIRJET- Data Mining - Secure Keyword Manager
IRJET- Data Mining - Secure Keyword ManagerIRJET Journal
 
An Evaluation and Overview of Indices Based on Arabic Documents
An Evaluation and Overview of Indices Based on Arabic DocumentsAn Evaluation and Overview of Indices Based on Arabic Documents
An Evaluation and Overview of Indices Based on Arabic DocumentsIJCSEA Journal
 
An Evaluation and Overview of Indices Based on Arabic Documents
An Evaluation and Overview of Indices Based on Arabic DocumentsAn Evaluation and Overview of Indices Based on Arabic Documents
An Evaluation and Overview of Indices Based on Arabic DocumentsIJCSEA Journal
 
Extraction and Retrieval of Web based Content in Web Engineering
Extraction and Retrieval of Web based Content in Web EngineeringExtraction and Retrieval of Web based Content in Web Engineering
Extraction and Retrieval of Web based Content in Web EngineeringIRJET Journal
 
Web_Mining_Overview_Nfaoui_El_Habib
Web_Mining_Overview_Nfaoui_El_HabibWeb_Mining_Overview_Nfaoui_El_Habib
Web_Mining_Overview_Nfaoui_El_HabibEl Habib NFAOUI
 
Paper id 28201425
Paper id 28201425Paper id 28201425
Paper id 28201425IJRAT
 
Design of file system architecture with cluster
Design of file system architecture with clusterDesign of file system architecture with cluster
Design of file system architecture with clustereSAT Publishing House
 
Information Retrieval based on Cluster Analysis Approach
Information Retrieval based on Cluster Analysis ApproachInformation Retrieval based on Cluster Analysis Approach
Information Retrieval based on Cluster Analysis ApproachAIRCC Publishing Corporation
 
INFORMATION RETRIEVAL BASED ON CLUSTER ANALYSIS APPROACH
INFORMATION RETRIEVAL BASED ON CLUSTER ANALYSIS APPROACHINFORMATION RETRIEVAL BASED ON CLUSTER ANALYSIS APPROACH
INFORMATION RETRIEVAL BASED ON CLUSTER ANALYSIS APPROACHijcsit
 
Efficient Database Management System For Wireless Sensor Network
Efficient Database Management System For Wireless Sensor Network Efficient Database Management System For Wireless Sensor Network
Efficient Database Management System For Wireless Sensor Network Onyebuchi nosiri
 
Implementation of Improved Apriori Algorithm on Large Dataset using Hadoop
Implementation of Improved Apriori Algorithm on Large Dataset using HadoopImplementation of Improved Apriori Algorithm on Large Dataset using Hadoop
Implementation of Improved Apriori Algorithm on Large Dataset using HadoopBRNSSPublicationHubI
 
Mining closed sequential patterns in large sequence databases
Mining closed sequential patterns in large sequence databasesMining closed sequential patterns in large sequence databases
Mining closed sequential patterns in large sequence databasesijdms
 
IRJET- Cluster Analysis for Effective Information Retrieval through Cohesive ...
IRJET- Cluster Analysis for Effective Information Retrieval through Cohesive ...IRJET- Cluster Analysis for Effective Information Retrieval through Cohesive ...
IRJET- Cluster Analysis for Effective Information Retrieval through Cohesive ...IRJET Journal
 
A cyber physical stream algorithm for intelligent software defined storage
A cyber physical stream algorithm for intelligent software defined storageA cyber physical stream algorithm for intelligent software defined storage
A cyber physical stream algorithm for intelligent software defined storageMade Artha
 
IRJET- Proficient Recovery Over Records using Encryption in Cloud Computing
IRJET- Proficient Recovery Over Records using Encryption in Cloud ComputingIRJET- Proficient Recovery Over Records using Encryption in Cloud Computing
IRJET- Proficient Recovery Over Records using Encryption in Cloud ComputingIRJET Journal
 
REVIEW: Frequent Pattern Mining Techniques
REVIEW: Frequent Pattern Mining TechniquesREVIEW: Frequent Pattern Mining Techniques
REVIEW: Frequent Pattern Mining TechniquesEditor IJMTER
 
IRJET- Cluster Analysis for Effective Information Retrieval through Cohesive ...
IRJET- Cluster Analysis for Effective Information Retrieval through Cohesive ...IRJET- Cluster Analysis for Effective Information Retrieval through Cohesive ...
IRJET- Cluster Analysis for Effective Information Retrieval through Cohesive ...IRJET Journal
 
Iare ds lecture_notes_2
Iare ds lecture_notes_2Iare ds lecture_notes_2
Iare ds lecture_notes_2RajSingh734307
 

Similar to AVL TREE AN EFFICIENT RETRIEVAL ENGINE IN CLASSIFIED FINGERPRINT DATABASE (20)

Hadoop Map-Reduce To Generate Frequent Item Set on Large Datasets Using Impro...
Hadoop Map-Reduce To Generate Frequent Item Set on Large Datasets Using Impro...Hadoop Map-Reduce To Generate Frequent Item Set on Large Datasets Using Impro...
Hadoop Map-Reduce To Generate Frequent Item Set on Large Datasets Using Impro...
 
IRJET- Data Mining - Secure Keyword Manager
IRJET- Data Mining - Secure Keyword ManagerIRJET- Data Mining - Secure Keyword Manager
IRJET- Data Mining - Secure Keyword Manager
 
An Evaluation and Overview of Indices Based on Arabic Documents
An Evaluation and Overview of Indices Based on Arabic DocumentsAn Evaluation and Overview of Indices Based on Arabic Documents
An Evaluation and Overview of Indices Based on Arabic Documents
 
An Evaluation and Overview of Indices Based on Arabic Documents
An Evaluation and Overview of Indices Based on Arabic DocumentsAn Evaluation and Overview of Indices Based on Arabic Documents
An Evaluation and Overview of Indices Based on Arabic Documents
 
Ay4201347349
Ay4201347349Ay4201347349
Ay4201347349
 
Extraction and Retrieval of Web based Content in Web Engineering
Extraction and Retrieval of Web based Content in Web EngineeringExtraction and Retrieval of Web based Content in Web Engineering
Extraction and Retrieval of Web based Content in Web Engineering
 
Web_Mining_Overview_Nfaoui_El_Habib
Web_Mining_Overview_Nfaoui_El_HabibWeb_Mining_Overview_Nfaoui_El_Habib
Web_Mining_Overview_Nfaoui_El_Habib
 
Paper id 28201425
Paper id 28201425Paper id 28201425
Paper id 28201425
 
Design of file system architecture with cluster
Design of file system architecture with clusterDesign of file system architecture with cluster
Design of file system architecture with cluster
 
Information Retrieval based on Cluster Analysis Approach
Information Retrieval based on Cluster Analysis ApproachInformation Retrieval based on Cluster Analysis Approach
Information Retrieval based on Cluster Analysis Approach
 
INFORMATION RETRIEVAL BASED ON CLUSTER ANALYSIS APPROACH
INFORMATION RETRIEVAL BASED ON CLUSTER ANALYSIS APPROACHINFORMATION RETRIEVAL BASED ON CLUSTER ANALYSIS APPROACH
INFORMATION RETRIEVAL BASED ON CLUSTER ANALYSIS APPROACH
 
Efficient Database Management System For Wireless Sensor Network
Efficient Database Management System For Wireless Sensor Network Efficient Database Management System For Wireless Sensor Network
Efficient Database Management System For Wireless Sensor Network
 
Implementation of Improved Apriori Algorithm on Large Dataset using Hadoop
Implementation of Improved Apriori Algorithm on Large Dataset using HadoopImplementation of Improved Apriori Algorithm on Large Dataset using Hadoop
Implementation of Improved Apriori Algorithm on Large Dataset using Hadoop
 
Mining closed sequential patterns in large sequence databases
Mining closed sequential patterns in large sequence databasesMining closed sequential patterns in large sequence databases
Mining closed sequential patterns in large sequence databases
 
IRJET- Cluster Analysis for Effective Information Retrieval through Cohesive ...
IRJET- Cluster Analysis for Effective Information Retrieval through Cohesive ...IRJET- Cluster Analysis for Effective Information Retrieval through Cohesive ...
IRJET- Cluster Analysis for Effective Information Retrieval through Cohesive ...
 
A cyber physical stream algorithm for intelligent software defined storage
A cyber physical stream algorithm for intelligent software defined storageA cyber physical stream algorithm for intelligent software defined storage
A cyber physical stream algorithm for intelligent software defined storage
 
IRJET- Proficient Recovery Over Records using Encryption in Cloud Computing
IRJET- Proficient Recovery Over Records using Encryption in Cloud ComputingIRJET- Proficient Recovery Over Records using Encryption in Cloud Computing
IRJET- Proficient Recovery Over Records using Encryption in Cloud Computing
 
REVIEW: Frequent Pattern Mining Techniques
REVIEW: Frequent Pattern Mining TechniquesREVIEW: Frequent Pattern Mining Techniques
REVIEW: Frequent Pattern Mining Techniques
 
IRJET- Cluster Analysis for Effective Information Retrieval through Cohesive ...
IRJET- Cluster Analysis for Effective Information Retrieval through Cohesive ...IRJET- Cluster Analysis for Effective Information Retrieval through Cohesive ...
IRJET- Cluster Analysis for Effective Information Retrieval through Cohesive ...
 
Iare ds lecture_notes_2
Iare ds lecture_notes_2Iare ds lecture_notes_2
Iare ds lecture_notes_2
 

Recently uploaded

Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 

Recently uploaded (20)

Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 

AVL TREE AN EFFICIENT RETRIEVAL ENGINE IN CLASSIFIED FINGERPRINT DATABASE

  • 1. International Educational Applied Scientific Research Journal ISSN (Online): 2456-5040 Volume: 1 | Issue: 1 | October 2016 30 AVL TREE AN EFFICIENT RETRIEVAL ENGINE IN CLASSIFIED FINGERPRINT DATABASE Ahmed B. Elmadani Department of Computer Science, Faculty of Science, Sebha University ABSTRACT Fingerprints are used to identify human and for crime discover. They are used to authenticate persons in order to allow them to gain access to their financial and personal resources or to identify them in big databases. This requires use of fast search engine to reduce time consumed in searching big fingerprint databases, there for choosing searching engine is an important issue to reduce searching time. This paper investigates the existing searching engine methods and presents advantages of AVL tree method over other methods. The paper will investigate searching speed and time consuming to retrieve fingerprint image. Experiment shows use of AVL tree is the best searching algorithm. Key Words: Fingerprint Databases, fingerprint classifies, AVL tree, Access Methods Algorithms. 1. INTRODUCTION Fingerprints have been used as the most popular biometric authentication and verification measure because of their high acceptability [15], immutability and uniqueness [1]. Fingerprint consists of a pattern of interleaved ridges and valleys [2]. There for they are used in differentiating people [10]. Fingerprint classification is a technique to assign a fingerprint into one of the several pre-specified types or classes namely, whorl, right loop, left loop, arch, and tented arch [8]. Fingerprint has two main types of features says [9]: 1. Global ridge and furrow structures which form special pattern in central region of the fingerprint, and 2. Local ridge and furrow minute details. Fingerprint classification is based on only the first type of features and uniquely identified based on the second type of features, such features are ridge endings, bifurcation known as minutiae, orientation field and singular points in a fingerprint image [9][10]. Data whatever it is must first be sorted to facilitate searching and make it easy for any retrieval, so far different sorting methods are invented, among those methods or algorithms Bubble sort, Merge sort, Insertion sort, Selection sort, Quick sort and tree based algorithms[11]. Data when it stored in a big store, searching in it becomes a difficult task and time consume especially when it became grows [10], searching methods known also as accessing methods in computer science. Many advanced algorithms and data structures have been devised for the sole purpose of making accessing more efficient, therefore there is possibility to use them in retrieving biometrics images from its big database [12]. Access methods in literature are, sequential (Queue), binary, graph and tree based search algorithms, in practical they are vary in their suitableness, means for each type of task a particular algorithm is used, because some are slow other are fast so selection is made on the type of use [11]. Graph search it is a traversal technique visits every node exactly one in a systematic fashion. The search process in a graph can be seen as applying a set of operators to the graph’s nodes until the goal node is found it initially defines the start node. Therefore, there is a general approach, applicable for any graph search, following the constraints. Two standard graph search techniques have been widely used, Depth-First Search (DFS) and Breadth-First Search (BFS) [11]. SQL search a structured query language (SQL) search, is a special-purpose designed for getting information from and updated database. It searches data in a relational database management system (RDBMS), or for stream processing in a relational data stream management system (RDSMS) [12]. Hash access method, data is stored in an extended linear hash table. The key and the data used for Hash records can be of arbitrarily complex data. Duplication of records is optionally supported in this method [16]. Queue access method it is similar to what known as sequential access method, data are stored in a queue as fixed-length records. Each record uses a logical record number as its key. This access method is designed for fast inserts at the tail of the queue, and it has a special operation that deletes and returns a record from the head of the queue. This access method is unusual in that it provides record level locking. This can provide beneficial performance improvements in applications requiring concurrent access to the queue [12]. Tree based search algorithms consist of trees, they are used in computer to represent algebraic formula, as an efficient method for searching large databases, dynamic lists, and diverse
  • 2. International Educational Applied Scientific Research Journal ISSN (Online): 2456-5040 Volume: 1 | Issue: 1 | October 2016 31 applications. A tree consists of a finite set of elements, called nodes. Trees can be represented generally in which each node can have an unlimited out-degree and binary tree in which no node have more than two sub-trees [4]. A binary tree is a method of placing and locating files (called records or keys) in a database, especially when all the data is known to be in random access memory (RAM) [13]. Adelson Velskii and Landis (AVL) tree is one of this implementation[6]. It is implementation of binary tree, for each node in the tree, the height of its left sub-tree differs from the height of its right sub- tree by no more than 1 [6]. The AVL Tree ensures that al operations can be performed in time logarithmic in the size of the tree [7]. The AVL Tree must meet strict balance requirements to maintain is O (log n) search capabilities [14], which is resulted in search time reduction [5]. As we seen there are different searching algorithms, in this research an experiment of retrieving fingerprint image based on its class will applied using different searching algorithms to select a suitable and fast search method as continuation of an algorithm written by [10], the following paragraphs will discuss used algorithm. To choose one of available access method for small working datasets that fit entirely in memory, there is no difference between Binary Tree and Hash. Both will perform just as well as the other says [16]. Binary Tree can be used if keys have some locality of reference where Hash can be used when a dataset is extremely large. Moreover, if your dataset becomes so large that database will almost certainly have to perform disk I/O to satisfy a random request, then Hash will definitely outperform Binary Tree because it has fewer internal records to search through than does Binary Tree [11]. Next paragraphs will propose an algorithm uses different access method to retrieve information from a data base consists of information collected from fingerprint images. 2. METHODOLOGY The following paragraphs will describe the proposed algorithm, experiment, obtained results and their analysis. The proposed algorithm can be summarized in two points as following: 2.1 Fingerprint database construction a. Fingerprint image collection and image preparation b. Fingerprint image class assigning c. Fingerprint feature extraction d. Fingerprint key (FPkey) calculation from features e. Store FPkey in index file and Fingerprint image in database. 2.2 Searching algorithms a. Follow the points from section 2.1 (a to d). b. Search from image using FPkey Apply different algorithms. c. Write obtained results for different search algorithms d. Analysis results. 2.3 Fingerprint database construction A description of a fingerprint database image collection and preparation for farther use will be given in the following paragraphs. 2. 3.1 Data collection Used Database contains about 10000 fingerprint images known as fdb10k is used. The fdb10k is a collection of fingerprint images that collected from internet FVC2000 combined with other captured locally from student and from staff. 2.3.2 Image preparation Fingerprint image as any image must be filtered to remove noise and resized. Winner filter was used to remove noise then each image was resized to 200x200 pixels. Sorting is beyond our research but a quick sort algorithm is used because it fast compared with other method and also suitable for this type of data. 2.4 Fingerprint image class assigning Each fingerprint image before storing it in database, it has to assign one of the five classes by following an algorithm described in [10] which is based on finding the singular points of the fingerprint image. An image of the fingerprint will be stored to its database class and this will facilitate fatherly searching process. Nine thousand five hundred and eighty one (9581) fingerprint images are used in classification process. Result of applying mentioned algorithm is shown in Table 1. 1996 as Arch, 989 as Tented arch, 2663 as Left Loop, 685 as Right Loop, and 3248 as Whorl. Table 1: Classification result of the collected fingerprint images Total A T LL RL W 9581 1996 989 2663 685 3248 2.5 Fingerprint feature extraction A procedure was written in C++ language to extract feature from fingerprint images. Calculated features are mean denoted by Mean equation (1), standard division denoted by Std-div equation (2) and variance denoted by Var equation (3), used formulas are shown below:
  • 3. International Educational Applied Scientific Research Journal ISSN (Online): 2456-5040 Volume: 1 | Issue: 1 | October 2016 32 Mean =  MN ji jiI , , ),( (1) where ni ....3,1,0 , 135,90,45,0 , iI sector in image  , and iM Mean of pixel value in iI . Std-div = 2 )),((  ii MeanyxI  (2) where ni ....3,1,0 , 135,90,45,0 , iI sector in image  , and iM Mean of pixel value in iI . Var =   MN ji MeanjiI , , )),(( (3) 2.6 Fingerprint key (FPkey) The FPkey is a fingerprint key that calculated using the formula (4) to be use as a unique key for retrieving the requested fingerprint image )( )10*10*10*( 210 fprINTFPkey VardivStdMeanabsfpr    (4) 2.7 FPkey field as index of Fingerprint image As mentioned above The FPkey field to be a unique key as shown in Table 2. It is used in searching an indexed file, where the class is used to indicate the database in which the fingerprint image can be find. By using the index file's FPkey it will be easy to find the image name as shown in Table 3. Fingerprint databases consist of five separate file each contains one of mentioned is class, 1 for Arch database, 2 for Tented arch database, 3 for Left Loop database, 4 for Right Loop database, and 5 for Whorl database. Table 2: FPkey index file class retrieval No. FPkey Class 1 113530 1 2 410118 4 3 410207 4 Table 3: FPkey index file image retrieval No. FPkey Image name 1 113530 A20 2 410118 R6000 3 410207 R6020 2.8 Fingerprint image searching in classified Fingerprint database Designing Databases with separate classes will minimize searching time, because each will contain less number of images and only a signal class compared to whole databases. When a fingerprint image is searched, it switched to different search engines each engine uses a search method different to the other based on that a fast searching method will be discover. An experiment was taken place by selecting several access methods Queue, Graph, SQL, Hash, Binary, and AVL tree as will be described in next sections. 2.9 Results for different Access algorithms An experiment of retrieving fingerprint image was performed using Dual-Core CPU, HDD 500GB, and 4 GB RAM. First only 100 fingerprints for each class were used, it shows delay in queue method where AVL tree is the fastest specially in retrieving a left loop (LL) fingerprint class. Chart – 1, Shows results of the performed experiment. Chart – 1: Time retrieval from 100 Fingerprint Database Another experiment was performed to retrieve fingerprint images from databases based on using big amount of fingerprints starting from 100 to ≈10000 using a single access methods to discover which the fastest method, used method are Queue, Graph, SQL, Hash, Binary Tree, and AVL tree Time retrieve for different Class based on single access method, experiment using a binary tree as retrieved algorithm, it shows that the arch class is fastest in retrieving were whorl is the slowest. Char – 2, shows results of using binary tree in retrieving fingerprint class. 0 0.05 0.1 0.15 0.2 0.25 0.3 0.35RetrivalTime Used Access Methods 100 Fingerprint Database A T LL RL W
  • 4. International Educational Applied Scientific Research Journal ISSN (Online): 2456-5040 Volume: 1 | Issue: 1 | October 2016 33 Chart – 2: Results of testing binary tree Then another experiment of retrieving fingerprint from database using graph method shows that Tarch is the fastest were arch is the slowest. Chart – 3, shows results of using graph in retrieving fingerprint class. Chart – 3: Results of testing graph method Same experiment was carried using SQL and hash which shows that retrieving arch is the fastest, were in using AVL tree retrieving lift loop is the fastest. Chart – 4, shows experiment of using SQL, Chart – 5, shows experiment of using Hash and Chart – 6, shows experiment AVL tree. Chart – 4: Results of testing SQL method Chart – 5: Results of testing Hash method Chart – 6: Results of testing AVL tree method An experiment also carried with use of different access method to retrieve a signal fingerprint class. In the experiment six access methods are used they are queue, sql, graph, binary tree, hash and AVL tree. In this experiment as shown in Chart – 7, AVL tree scores fastest in retrieving a Tarch class were queue is the slowest. Chart – 7: Time retrieve for Tarch Class using different access methods 0 0.1 0.2 0.3 100 300 700 1500 3000 7000 ≈10000 RetrivalTime Number of Fingerprints Binary Tree Access Method A T L L R L 0.24 0.25 0.26 0.27 0.28 RetrivalTime Number of Fingerprints Graph Access Method A T LL RL W 0 0.1 0.2 0.3 0.4 0.5 100 300 700 1500 3000 7000 ≈10000 RetrivalTime Number of Fingerprints SQL Access Method A T LL RL W 0 0.05 0.1 0.15 0.2 0.25 100 300 700 1500 3000 7000 ≈10000 RetrivalTime Number of Fingerprints AVL Tree Access Method A T LL RL W 0 0.5 1 1.5 2 100 300 700 1500 3000 7000 ≈10000 Timeretrive Number of Fingerprints Tarch Database Queue T SQL T Graph T Bin Tree T Hash T AVL tree T 0 0.1 0.2 0.3 0 5000 10000 15000 RetrivalTime Number of Fingerprints Hash Access Method A T LL RL W
  • 5. International Educational Applied Scientific Research Journal ISSN (Online): 2456-5040 Volume: 1 | Issue: 1 | October 2016 34 Same experiment was repeated using arch class, whorl class, right loop class it shows that AVL tree is the fastest where queue the lowest. Chart - 8, Chart - 9 and Chart - 10, show that AVL tree always the fastest and queue is the slowest. Figures also shows that other methods still can be used but when a discussion is concerned to the accessing of information in database minimum time is preferred. So use of AVL tree for this type of data is best solution. Chart – 8: Time retrieve for Arch Class using different access methods Chart – 9: Time retrieve for whorl Class using different access methods Chart 10: Time retrieve for Right Loop Class using different access methods 2.10 Results Analysis Results show an importance of separating fingerprint class in minimizing searching databases and in time retrieval. This fact was noted at pre-tests of the proposed algorithm. The AVL tree because it adjust it salve after any insertion or deletion so it can easily access any particular information in the given database, this gives it an advantage even with binary tree that share some similarity specially when a small set of item are used as shown in charts Chart - 8, Chart - 9, and Chart - 10. The queue method is not suitable for this type of data so it scores a big retrieval time even with small set database as shown in mentioned figures. Table 4, shows access time that scored from different used access method and it shows that AVL tree is the fastest among all. Table 4: Average access time using different fingerprint databases 3 CONCLUSION This work shows a model of how fingerprint can be classified in database based on class, and then uses several methods to retrieve them. The work proves that an AVL tree is the fastest access and retrieval method not only for fingerprint class but it works effectively for any type of data. 0 0.5 1 1.5 2 RetriveTime Number of Fingerprints Arch Database Queue A SQL A Graph A Bin Tree A Hash A 0 0.5 1 1.5 2 RetriveTime Number of Fingerprints Whorl Database Queue W SQL W Graph W Bin Tree W Hash W 0 0.5 1 1.5 2 2.5 RetriveTime Number of Fingerprints Right Loop Database Queue RL SQL RL Graph RL Bin Tree RL Hash RL AVL tree RL Data Base Access method Avg. 100 Avg. 1500 Avg. ≈10000 Graph 0.25 0.255 0.262 Hash 0.19 0.233 0.247 Bin Tree 0.214 0.240 0.251 AVL tree 0.16 0.166 0.176 SQL 0.21 0.32 0.39 Queue 0.32 0.35 0.46
  • 6. International Educational Applied Scientific Research Journal ISSN (Online): 2456-5040 Volume: 1 | Issue: 1 | October 2016 35 REFERENCES [1] M. H. Bhuyan, S. Saharia, and D. K. Bhattacharyya, “An Effective Method for Fingerprint Classification” International Arab Journal of e-Technology, Vol. 1, No. 3. 2010. [2] R. J. Tom1 and T. Arulkumaran, “ Fingerprint Based Gender Classification Using 2D Discrete Wavelet Transforms and Principal Component Analysis” International Journal of Engineering Trends and Technology- Vol.4 Issue 2. 2013. [3] S. Gagandeep and O. Jasuja “Latent Fingerprint Development” Dye formulations LAP LAMBERT Academic Publishing. 2012. [4] R. F. Giberg and B. A. Forouzan, “Data Structures A Pseudocode approach with C++”, Brooks/Cole, USA. 2001. [5] Blieberger, “Discrete Loops and Worst Case Performance, Computer Languages”, Vol. 20, No. 3, (pp. 193-212).1994. [6] M. Medidi and D. Deo “Parallel dictionaries on AVL trees”, Eighth International Parallel Processing Symposium Proceedings. (pp. 878 –882). 1994. [7] K. S. Larsen “AVL trees with relaxed balance Eighth International Parallel Processing Symposium Proceedings. (pp. 888 –893). 1994. [8] D. Maio and D. Maltoni ”A Structural Approach to Fingerprint Classification”, in proceedings 13th ICPR, Vienna. Vol. 3. (pp. 578 –585). 1996. [9] K. Jain, S. Prabhakar and L. Hong “A multichannel approach to fingerprint classification” IEEE Transactions on Pattern Analysis and Machine Intelligence.Vol.21 Issue: 4. (pp. 348 – 359). 1999. [10] B. Elmadani “Classification of Fingerprints based on Singular Points” Applied Science journal Sebha University. Vol. 8. No. 1. 2015. [11] N. Thomas “Sorting and Searching Algorithms: A Cookbook”. At http://members.xoom.com/thomasn/s_man.htm. Accessed 1.1. 2016. [12] H. Feng, D. John and Z. S. Piotr “ A Fast Search Algorithm for a Large Fuzzy Database” IEEE Transactions on Information Forensics and Security, Vol. 3, No. 2, June 2008. [13] R. Chadha, R. Misal and T. Mokashi “Modified Binary Search Algorithm” International Journal of Applied Information Systems (IJAIS) – ISSN : 2249-0868 Foundation of Computer Science FCS, New York, USA Vol. 7. No. 2. 2014. [14] B. Elmadani and V. Prakash “New Technique in Fingerprint Matching based on An-AVL tree Search algorithm” Journal of Technology and commerce Brunei Darussalam. Vol 4. No. 1. 2006. [15] R. J. Tom, T. Arulkumaran and M. E. Scholar “Fingerprint Based Gender Classification Using 2D Discrete Wavelet Transforms and Principal Component Analysis” International Journal of Engineering Trends and Technology- Vol.4 No. 2. 2013. [16] Introduction To Electrical Engineering and computer Science http://ocw.mit.edu/courses/electrical-engineering-and computer-science/6-01sc-introduction-to-electrical- engineering-and-computer-science-i-spring-2011/unit-4- probability-and-planning/optimizing-a-search/ 2011. Accessed: 1.6.2016.