tejas n. athavale, sangram a. nalawade information technology 208-210 67 plight of rape victims with...

10
ISSN - 2250 - 1991 Volume : 1 Issue : 5 May 2012 ` 200 www.paripex.in L i s t e d i n I n t e r n a t i o n a l I S S N D i r e c t o r y , P a r i s . Journal for All Subjects

Upload: others

Post on 22-Mar-2020

0 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Tejas N. Athavale, Sangram A. Nalawade Information Technology 208-210 67 Plight of Rape Victims With Special Reference to India Dr. Monica Narang, Richa Sabharwal Law 211-212 68

ISSN - 2250 - 1991Volume : 1 Issue : 5 May 2012` 200

www.paripex.inListed in International ISSN Directory, Paris.

Journal for All Subjects

Page 2: Tejas N. Athavale, Sangram A. Nalawade Information Technology 208-210 67 Plight of Rape Victims With Special Reference to India Dr. Monica Narang, Richa Sabharwal Law 211-212 68
Page 3: Tejas N. Athavale, Sangram A. Nalawade Information Technology 208-210 67 Plight of Rape Victims With Special Reference to India Dr. Monica Narang, Richa Sabharwal Law 211-212 68

INDEXSr. No. Title Author Subject Page No.

1 Convergence of India Gaap with International GAAP / IFRS

Prof. Kalola Rimaben A. Accountancy 1-3

2 Global Scenario of Business Ethics With Corporate Governance

Prof. Dr.Kishor V. Bhesaniya

Accountancy 4-6

3 VAT & ACCOUNTING Miss. Mira J. Bhanderi Accountancy 7-8

4 Carbon Trading: An Emerging Business Dr. Basanta Khamrui, Dilip Kumar Karak

Commerce 9-11

5 Developments in Indian Non Life Insurance Industry Ms.Kiran Sood, Ms.Supriya Tandon

Commerce 12-14

6 Parameters And Costs Influencing Transportation Decisions In Small Manufacturing Firms

Vipul Chalotra,Prof Neetu Andotra

Commerce 15-17

7 Foreign Trade Policy of India (2009-14) Dr. M. K. MARU Commerce 18-20

8 “A Comparative Analysis on Profitability of Selected Petroleum Industries”

Dr. Ramesh A. Dangar Commerce 21-23

9 An Empirical study on Consumer Awareness on Internet Banking in Gujarat

Dr. Vinod K. Ramani Commerce 24-26

10 Study of Factors Affecting HNIs’ Preferences for their Banks in South Mumbai Area

Shri. Arvind A. Dhond Commerce 27-31

11 Promotion mix straregy of jammu and kashmir co-operatives supply and marketing federation limited in jammu district of J&K state

Tarsem Lal Commerce 32-35

12 Intelligent Brain Tumor Tissue Segmentation from Magnetic Resonance Image using forward and backward anisotropic diffusion

S.Nithya Roopa,P. Vasanthi Kumari

Computer Science

36-38

13 Share of Women in Total Family Income – A Two Group Discriminant Analysis

Dr.A.Shyamala Economics 39-41

14 Socio-Economic Evaluation of Shg’s in Bidar District of Karnataka

Dr.Sangappa V. Mamanshetty

Economics 42-44

15 The Development of Chemical and Petrochemicals Industry in Gujarat

Dr.D.G.Ganvit Economics 45-46

16 How Can Primary Teachers Help To Assist The Development Of Positive Self-Esteem In Students Through Their Ordinary Teaching Practice?

Jigar L. Dave Education 47-48

17 Primary Mission Of Colleges Jigar L. Dave Education 49

18 Effectiveness of Readers Theatre on English Reading Comprehension

Ramesh B. Sakhiya Education 50-51

19 The Role of a Computerized Package on EFL Students' Writing Skills

Abdallah Ahmad, Baniabdelrahman, Abdulaziz A. Abanomey

Education 52-57

20 The Use of Team Teaching and its Effect on Saudi EFL Students' English Proficiency

Abdallah Ahmad, Baniabdelrahman, Abdulaziz A. Abanomey

Education 58-63

21 Study and Development of Road Traffic Noise Model Bhavna K. SutharV. R. Gor, A. K. Patel

Engineering 64-66

Page 4: Tejas N. Athavale, Sangram A. Nalawade Information Technology 208-210 67 Plight of Rape Victims With Special Reference to India Dr. Monica Narang, Richa Sabharwal Law 211-212 68

22 Weather Forecast Using Artificial Neural Network Laxmikant Raskar, Rohit Waghchaure, Md. Danish Raza,Mayuresh Lande

Engineering 67-68

23 Pavement Subgrade Stabilisation with Rice Husk Ash Patil N. L.,Dr. Sanjay Sharma,Dr. Hemant Sood

Engineering 69-71

24 Study of Precipitation and Stream Flow Data- A Case Study of Kim Basin

Prashant A. Ramani Engineering 72-76

25 “Estimation of Revised Capacity for Deo Reservoir of Gujarat, India”

Hiral Shah,N. N. Borad, R. K. Jain

Engineering 77-79

26 Nanotechnology in Cellular Lightweight Concrete Mr. Nakul Shah, Prof. Jayeshkumar Pitroda

Engineering 80-82

27 Plate Load (Model) Test for Bearing Capacity of Layered Deposite

Patel Ankit D., B.R. Dalwadi

Engineering 83-85

28 Effect of Service Bridge on natural frequency of structurally coupled multistory building

Upadhyay Nishith H., Prof. A.N. Desai

Engineering 86-88

29 “Controling the Soil & Land Pollution in Sabarkantha District by Using an App Lication of Remote Sensing and Geographical Information System”

Gaurang J Patel,R.B Khasiya

Engineering 89-91

30 Control The Soil Erosion & Land Pollution By Flood Reduction in The Tapi River,Surat District, Gujarat, India.

Harshad M.Rajgor,K B Khasiya

Engineering 92-95

31 Methodology for managing irrigation canal system with optimum irrigation scheduling for Meshwo irrigation Scheme

Jitendrasinh D. Raol, Roshani A.Patel,Prof S.A.Trivedi

Engineering 96-98

32 Analyis of regional water supply scheme in rural areas (Case Study: Kutch)

Niketa Patel Engineering 99-103

33 Security For Near Field Communication in Cell Phone Biren M Patel, Vijay B Ghadhvi,Mr Ashish Kumar

Engineering 104-106

34 Heterogeneous Traffic Flow Simulation at Urban Roundabout using ‘VISSIM’

Dipti S. Thanki, Asst. Prof. Ashutosh K. Patel

Engineering 107-109

35 Planning of Facilities for Pedestrian Movement in Urban Area: A Case Study of Vadaj Circle, Ahmedabad

Hitesh A. Patel,Pinak. S. Ramanuj

Engineering 110-113

36 Planning for Non-Motorized Transportation Jignesh C.Prajapati, Prof. N.G.Raval

Engineering 114-116

37 Intersection Design for Pedestrians and Cyclist Jignesh C.Prajapati, Prof. N.G.Raval

Engineering 117-120

38 Theoretical Consideration for optimum irrigation scheduling for irrigation Scheme

Jitendrasinh D. Raol, Prof S.A.Trivedi

Engineering 121-124

39 Overall Equipment Effectiveness Measurement and Review of Total Productive Maintenance

Kadiya Pinjal, Navinchandra

Engineering 125-128

40 To Study the Effect Of Stiffness on the Expansion Joint of a Building Subjected to Earthquake Forces

M.D.SHAH, P. G. Patel Engineering 129-132

41 Side Friction and Side Friction Factor (FARIC) In Ahmedabad Road Link

Parmar Dushyant J, Asst. Prof. Ashutosh K. Patel

Engineering 133-134

42 Fiber Reinforced Selfcompacting Concrete Patel Nikunj R,Elizabeth George

Engineering 135-137

Page 5: Tejas N. Athavale, Sangram A. Nalawade Information Technology 208-210 67 Plight of Rape Victims With Special Reference to India Dr. Monica Narang, Richa Sabharwal Law 211-212 68

43 Modal Analysis of Helical Gear Purusharth J. Patel,D.A. Patel

Engineering 138-140

44 Impact Strength of Ternary Blended Steel fiber Reinforced concrete

Samir M. Gami., D.A.Sinha

Engineering 141-143

45 Identify issues of traffic movement at landside area & remedial measures

Samir P. Mulani,Prof- Naurdin Hajiani

Engineering 144-147

46 Identification of Truck Transportation Issues at a Junction: a case study of Sarkhej Area

Himanshu. B. Shrimali, Prof- Naurdin Hajiani

Engineering 148-152

47 Assessment of Vehicular Carbon Footprint and its Reduction Measures

Chintan Patel,Prof. H.K.Dave

Engineering 153-155

48 Study of Solar Air Heaters with Different Operating Configurations

Ajaypalsinh Gangasinh Barad

Engineering 156-158

49 Traffic Flow Characteristics on Roads of Small Urban Centre

Axay S. Shah,Dr. L.B.Zala

Engineering 159-162

50 Failure in tensile testing on single lap multi-fastener joint with bolted connection

Jagdish N.Prajapati, Dr.Rajula.k.Gujjar, Prof.M.M.Pomal

Engineering 163-167

51 Study Of Infiltration Capacity At Anjar, Kutch Ravi C Ahir, Sagar D Patel

Engineering 168-169

52 Comparison of Temperature-Base Methods For Calculating Reference Evapotranspiration With Standard Penman-Monteith Method

M.R.Popat, S.N.Chavda, B.H.Pandit

Engineering 170-172

53 Electronic customer relationship management: benefits and trend

Tanuja Nair Engineering 173-174

54 VIRTUAL CLASS ROOM USING MOBILE AD-HOC NETWORK

Gaurav Katariya, Yogesh Parkhe, Devendra Patil,Pawan Pawar

Engineering 175-176

55 PARKING EVALUATION: A CASE STUDY OF AMUL DAIRY ROAD ANAND

Jaydipsinh P. Chudasama, Dr. L.B.Zala

Engineering 177-180

56 ENERGY ANALYSIS OF SOLAR AIR HEATER BY USING DIFFERENT TYPES OF ABSORBER PLATES

Vivek B. Patel,Dr. L.B.Zala

Engineering 181-183

57 Effect of Aspect Ratio W/L ,Body Bias ,and supply Voltage (vDD) for NMOS & PMOS transistor.

Rubina Siddiqui, Angeeta Hirwe, Rahul Parulkar

Engineering 184-186

58 Spider diversity of Wan Wild life Sanctuary, Vidharbha , India.

Taktode N.M. Environment 187-188

59 The Initial Human Behavioural Response to Rapid On set Natural Disaster: Earthquake

S.S. Patil, K.L. Karkare, I.B. Ghorade

Environmental Science

189-190

60 Spatio-temporal Distribution of Surface Water for Irrigation in Satara District of Maharashtra: An Analytical Study

Pawar D. H., Jadhav K.R.

Geography 191-193

61 Nagarcha wadh v kushi bhumi upyog badal nanded-vaghan ek abhyas pahani

Prof. Mane Deshmukh R. S., Dr. S. B Rathod

Geography 194-196

62 Socio-Economic and Nutritional Status of Children with Mental Retardation

Dr. S. S. Vijayanchali Home Science 197-199

63 Motivating Employees under Adverse Conditions Dr Alpesh B Joshi Human Resource

200-202

64 “Strategic Human Resource Management” Dr. M. Venkatasubba Reddy, B. Swetha,S. Jaya Krishna

Human Resource Management

203-204

Page 6: Tejas N. Athavale, Sangram A. Nalawade Information Technology 208-210 67 Plight of Rape Victims With Special Reference to India Dr. Monica Narang, Richa Sabharwal Law 211-212 68

65 Identifying Crosscutting Concerns for Software Requirement Engineering

Velayutham Pavanasam, Chandrasekaran Subramaniam

Information Technology

205-207

66 Gate pass Automation with Image,Barcode reading and Biometrics

Sumant C. Murke,Tejas N. Athavale, Sangram A. Nalawade

Information Technology

208-210

67 Plight of Rape Victims With Special Reference to India Dr. Monica Narang, Richa Sabharwal

Law 211-212

68 Libraries: An Essential Tool for the Advancement of Knowledge Resources & Research in Recent Era

Dr. Umesh Patel Library Science 213-215

69 An Analytic Study of BA/BSc/BCA/BCom Part I General English Syllabus Prescribed by the University of Jammu

Dr. Wajahat Hussain Literature 216-217

70 A Study on Quality of Work Life Dr.N.Thenpandian Management 218-219

71 Best HR Practices Kavita Trivedi Management 220-221

72 A Study on Employee Retention Practices of Automobile Industry in INDIA

Dr.K.Balanaga Gurunathan, Ms. V.Vijayalakshmi

Management 222-224

73 A Study on Innovation for Organizational Excellence in Health Care Industry in a Private Multi-Speciality Organization

Dr. C. Swarnalatha,T.S. Prasanna

Management 225-227

74 “Performance measurement of Top 10 Mutual Funds with the help of Sharpe, Treynor & Jenson Model”

Monal Patel, Dr. Deepak H. Tekwani

Management 228-230

75 Strategic Expansion for Growth A Case Study on Codescape Consultants Pvt Ltd. (Infinite Possibilities)

Akshay Arora,Abhilansh Bhargava, Preeti Sharma

Management 231-232

76 Role Of Education In Innovation For Economic Development - A Case Study

Dr. Ananthapadhmanabha Achar

Management 233-238

77 ROLE OF HR PROFESSIONAL IN DEALING DISCIPLINARY PROCEEDINGS CONSTRUCTIVELY - AN OVERVIEW

C Santhanamani, Dr. N. Panchanatham

Management 239-241

78 Power of Advertising Supriya Tandon Management 242-244

79 Enhancing Employee Engagement: A Need of The Hour Urmila Vikas Patil Management 245-247

80 Role of E-Learning to Enhance Qualities of Physical Education Teachers and Coaches

Gohil Rajendrasinh K. Physical Education

248-250

81 “Eco – Environmental Study on Nutrient Removal Potential of Eichhornia Crassipes from Domestic Wastewater”

D. K. Patel, V. K. Kanungo

Science 251-253

82 Aphasia – a loss of linguistic faculty Dr Alpesh B Joshi Social Sciences 254-256

83 Workaholism – A Modern Day Nuisance Dr Alpesh B Joshi Social Sciences 257-258

84 Vartman me Dalit Varg ki Samasya Dr. H. L. Chavda Sociology 259-260

Page 7: Tejas N. Athavale, Sangram A. Nalawade Information Technology 208-210 67 Plight of Rape Victims With Special Reference to India Dr. Monica Narang, Richa Sabharwal Law 211-212 68

Volume : 1 | Issue : 5 | May 2012 ISSN - 2250-1991

208 X PARIPEX - INDIAN JOURNAL OF RESEARCH

Research Paper

* Mahatma Society, Plot no. 359, Survey No.: 62+65, Kothrud, Pune:-411029, Maharashtra

** 1,Kaustubh, Shamsunder Soc., Dattawadi, Nr Mhatre Bridge, Pune 411030, Maharashtra

*** Mahatma Society, Plot no. 359, Survey No.: 62+65, Kothrud, Pune:-411029, Maharashtra,

Information Technology

Gate pass Automation with Image,Barcode reading and Biometrics

* Sumant C. Murke ** Tejas N. Athavale*** Sangram A. Nalawade

Keywords : Gate pass, Barcode, Image, Biometrics

An Enterprise Security Software for controlling, monitoring and authorizing visitors in the company. It allows visitor photograph capturing, communication between security and employees, visitor authentication by the visitor, auto forwarding of authorization request in absence of visitor, auto-login facility for the users, gate pass printing with barcode and visitors photograph, current visitors list, out-time posting, visitor history etc. SummaryOur system is proposed to use Bar code generation, Finger printing and Image processing in generation of a gate pass which eliminates the flaws in the existing security systems. These systems are frequently used to complement building or any organization security systems and access control systems. The application is developed successfully and implemented as mentioned above.This system seems to be working fine and successfully. This system can able to provide the proper training set of data and test input for security purposes. The face matched with initial image taken or not is given in the form of picture image if matched on the generated pass.The pass can be of two types one for temporary visitors and another for the permanent (regular) users.

ABSTRACT

1 What is Gate pass automation system?The purpose of this system is to automate and computerize the information and record in the institution or big enterprises. Now-a-days big ventures have number of people working un-der them, it becomes impossible to keep track on every work-er or contractor .Workers might be on daily basis so keeping track on them becomes a hectic problem.

First of all, one card is issued to the person whom you like to give the privilege to enter into your premises or to update the database. The card contains one program and a security code. The security code is generated randomly. This security code is compare with the database that we have and if the security code matches with the security code of the card then you can enter the premises. But, this card and the card reader have some problem and it may lead to the any of the penetra-tion of security.

a. First of all, if the person, to whom the card has been is-sued, can give his card to some other unauthorized per-son or it may be stolen. Before the reporting to higher authority and before blocking the access of that card one may misuse that card.

b. Card may damage or can cause malfunction and in meantime person can’t enter in to premises where there may be some urgency.

To avoid these stuffs we can use a new gadget called “Finger-print Reader” and”Image scanner”. Where the “finger print” and “image” of the authorize person will be taken and store into data storage. Then, at the time of entering the fingerprint of the person will be compared with the fingerprint save in the data storage. This are the more secure and more reliable and expert are thinking that these are the future security applica-tion which will replace the card reader. After which you can

generate a “Barcode” for the given information so as to keep the information more secured and to easily access in large enterprises and ventures.

2 BACKGROUND:To provide security and data inconsistency, data integ-rity, data reliability, one card is issued to the person whom you like to give the privilege to enter into your premises or to update the database. The card contains one program and a security code. The security code is generated ran-domly. This security code is compare with the database that we have and if the security code matches with the se-curity code of the card then you can enter the premises. But, this card and the card reader have some problem and it may lead to the any of the penetration of security. First of all, if the person, to whom the card has been issued, can give his card to some other unauthorized person or it may be stolen. Before the reporting to higher authority and before blocking the access of that card one may misuse that card.

Card may damage or can cause malfunction and in meantime person can’t enter in to premises where there may be some urgency.

To avoid these stuffs we can use a new gadget called “Finger-print Reader” and”Image scanner”. Where the “finger print” and “image” of the authorize person will be taken and store into data storage. Then, at the time of entering the fingerprint of the person will be compared with the fingerprint save in the data storage. This are the more secure and more reliable and expert are thinking that these are the future security applica-tion which will replace the card reader. After which you can generate a “Barcode” for the given information so as to keep the information more secured and to easily access in large enterprises and ventures.

Page 8: Tejas N. Athavale, Sangram A. Nalawade Information Technology 208-210 67 Plight of Rape Victims With Special Reference to India Dr. Monica Narang, Richa Sabharwal Law 211-212 68

Volume : 1 | Issue : 5 | May 2012 ISSN - 2250-1991

PARIPEX - INDIAN JOURNAL OF RESEARCH X 209

3 FINGERPRINT SCANNER:This device which is used for taking input data from visitors, contractors and employees. It’s not a difficult job for both ad-ministrator and user .User needs to keep his finger on device front glass panel and finger print scanner will take impres-sion of finger within fraction o seconds. It will help to reduce manual efforts of administrator and visitors time of filling the fields related to enquiry form or visitors log in form.

4 INBUILT CAMERA:The system will be loaded with inbuilt front camera. As and when user associated with the system will approach to it the camera will automatically start working on image of user. When system will get satisfactory inputs about user from user form then camera will capture the image of user which will be stored back to the database and associated information about user so retrieved as and when required.

5 Comparison with current working application:Now-a-days security has become a primary purpose for any institute, industries etc.With crime rates up, many residents, industrialist feel uneasy about relying solely on the protection of the law. With continued technological advancements, there is no reason not to look into additional security. A home secu-rity system is a great way to provide extra protection for you home or business. Hence it gave birth to biometrics. But still there is no guarantee of full security as many fake identifica-tion is done; even fake vehicle registration is seen.

So to overcome this problem ConSt softwares has taken the decision to make a gate pass software with kiosk machine ,so we can avoid the entries which is bluff, fake etc.

With the help of our company guide we surveyed with few major companies like secugen ,digital persona ,suprmo etc .We then decided to work with digital persona as their prod-uct was more secured. For our security software we studied few worldwide published papers and decided to refer NSTC papers.

Table of Description:

Table 1

2 System Architecture

Fig 2

The system architecture consists of the following compo-nents:

1. Multiple gates2. Some network connection like LAN, WAN3. Database server4. Terminals

Entry can be made through any gate as all gates will have security personnel to check the visitors and their id’s.

Database server is needed to store the data which is taken from the visitors and retrieve it whenever needed.

Also the terminals are used to transfer messages to adminis-tration or vice versa and for passing the messages some kind of network connection is needed depending on the terminals used.

Modules Used4.1 Bar code Generator

Fig 4

These are the main modules used in GATE PASS AUTOMA-TION.

The modules are stated below:

1. GUI:- In computing, a graphical user interface is a type of user in-terface that allows users to interact with electronic devices with images rather than text commands. GUIs can be used in computers, hand-held devices such as MP3 players, port-able media players or gaming devices, household appliances and office equipment.

A major advantage of GUIs is that they make computer op-eration more intuitive, and thus easier to learn and use. For example, it is much easier for a new user to move a file from one directory to another by dragging its icon with the mouse than by having to remember and type seemingly arcane com-mands to accomplish the same task.

Adding to this intuitiveness of operation is the fact that GUIs generally provide users with immediate, visual feedback about the effect of each action. For example, when a user

Page 9: Tejas N. Athavale, Sangram A. Nalawade Information Technology 208-210 67 Plight of Rape Victims With Special Reference to India Dr. Monica Narang, Richa Sabharwal Law 211-212 68

Volume : 1 | Issue : 5 | May 2012 ISSN - 2250-1991

210 X PARIPEX - INDIAN JOURNAL OF RESEARCH

deletes an icon representing a file, the icon immediately dis-appears, confirming that the file has been deleted (or at least sent to the trash can).This contrast with the situation for a CLI, in which the user types a delete command (inclusive of the name of the file to be deleted) but receives no automatic feedback indicating that the file has actually been removed.

In addition, GUIs allow users to take full advantage of the powerful multitasking (the ability for multiple programs and/or multiple instances of single programs to run simultane-ously) capabilities of modern operating system by allowing such multiple programs and/or instances to be displayed si-multaneously. The result is a large increase in the flexibility of computer use and a consequent rise in user productivity.

2. Bar code Generator:-Whenever new visitor comes across the system using bar code generator algorithm system creates one barcode to uniquely identify user whenever user log outs the system.

The mapping between visitor information and barcodes is called a symbology. The specification of a symbology in-cludes the encoding of the single digits/characters of the visi-tor name as well as the start and stop markers into bars and space, the size of the quiet zone required to be before and after the barcode as well as the computation of a checksum.

3. Database:This is the most important module. It contains all data regard-ing bar code generated by the system and particular visitor associated with that code. This can be retrieved as when re-quired for data processing and report making.

4 Fingerprint Processing

Fig 5

These are the main modules used in GATE PASS AUTOMA-TION.

AcknowledgementWe would like to thank all the researchers working in this field who in one way or another guided us in achieving on our goal.

ConclusionThe goal of this project has been to use bio-metrics and standard input technology in order to enhance the data re-cording experience. This has been proved to be possible from a technological viewpoint through the proof-of-concept imple-mentation of bio-metrics system. It basically showed that it is possible to create central location and report view of visitor, contractor and employee attendance record as a results of a verification of visitor , employee and contractor by fetching stored information from a DB regarding barcode generated by system, and image captured by inbuilt cameras provided by user machine.

In addition the application is implemented as a barcode gen-erator and repository system that helps admin to create report and navigate through employees, contractors and visitors re-ports and information. The application works on KIOSK ma-chine only since it relies on touch button panel. Future exten-sions may look at work from home options such as working from remote location and attendance will be added accord-ingly hour bases and other service or resources can be avail-able online for user.

REFERENCES

1] D. Maltoni, D. Maio, A. K. Jain, S. Prabhaker, “Handbook of Fingerprint Recognition”, Springer, New York, 2003. | [2] A.C. Weaver, “Biometric authentication”, Computer, 39(2), pp 96-97 (2006). | [3] J. Ortega-Garcia, J. Bigun, D. Reynolds and J.Gonzalez-Rodriguez, “Authentication gets personal with biometrics”, Signal Processing Magazine, IEEE, 21(2), pp 50-62 (2004). | [4] Anil K. Jain, Arun Ross and Salil Prabhakar,” An introduction to biometric recognition”, Circuits and Systems for Video Technology, IEEE Transactions on Volume 14, Issue 1, Jan. 2004 Page(s):4 – 20. | [5] Fakhreddine Karray, Jamil Abou Saleh, Mo Nours Arab and Milad Alemzadeh,, “Multi Modal Biometric Systems: A State of the Art Survey” , Pattern Analysis and Machine Intelligence Laboratory, University of Waterloo, Waterloo, Canada. | [6] Abdulmotaleb El Saddik, Mauricio Orozco, Yednek Asfaw, Shervin Shirmohammadi and Andy Adler “A Novel Biometric System for Identification and Verification of Haptic Users”, Multimedia Communications Research Laboratory (MCRLab) School of Information Technology and Engineering University of Ottawa, Ottawa, Canada. | [7] H. C. Lee and R. E. Gaensslen, “Advances in Fingerprint Technology”, Elsevier, New York. | [8] Sharath Pankanti, Salil Prabhakar, Anil K. Jain, “On the Individuality of Fingerprints”, IEEE transaction on pattern analysis and machine intelligence, vol.24, no.8, august 2002. | [9] Federal Bureau of Investigation, “The Science of Fingerprints: Classification and Uses”, U. S. Government Printing Office, Washington, D. C., 1984. | [10] H. C. Lee and R. E. Gaensslen (eds.), “Advances in Fingerprint Technology”, Second Edition, CRC Press, New York, 2001. [11] K.G.M.S.K. Jayawardana, T.N. Kadurugamuwa, R.G. Rage and S. Radhakrishnan”, Timesheet: An Attendance Tracking System”, Proceedings of the Peradeniya University Research Sessions, Sri Lanka, Vol.13, Part II, 18th December 2008. | [12] Yohei KAWAGUCHI, Tetsuo SHOJI , Weijane LIN ,Koh KAKUSHO , Michihiko MINOH ,“Face Recognition-based Lecture Attendance System”, Department of Intelligence Science and Technology, Graduate School of Informatics, Kyoto University. Academic Center for Computing and Media Studies, Kyoto University

Page 10: Tejas N. Athavale, Sangram A. Nalawade Information Technology 208-210 67 Plight of Rape Victims With Special Reference to India Dr. Monica Narang, Richa Sabharwal Law 211-212 68

Editor,PARIPEX - Indian Journal Of Research8-A, Banans, Opp. SLU Girls College,New Congres Bhavan, Paldi, Ahmedabad-380006.Contact.: +91-8866003636 E-mail : [email protected]

Printed at Unique Offset, Novatsing Rupam Estate, Opp. Abhay Estate, Tavdipura, Shahibaug, Ahmedabad

Sara Publishing AcademyPARIPEX - Indian Journal Of Research

Journal for All Subjects

International Index JournalFor English, Hindi, Gujarati,

Marathi, Sanskrit