IJMSC Vol. 7, No. 4, 8 Dec. 2021
Cover page and Table of Contents: PDF (size: 708KB)
Full Text (PDF, 708KB), PP.32-42
Views: 0 Downloads: 0
Mortuary, deceased, biometric, paper-based, fingerprint, identification, claimant
The mortuary industry in most developing countries are in need of improvement on the receiving and releasing of deceased persons. Paper-based mortuary systems lack reliability, timely information retrieval, accountability, data security and access control; compared to computer-based, mortuaries are the norm in advanced countries. This study reports the development of a fingerprint-based biometric mortuary system for deceased identification and claiming. The system design methodology was based on the object-oriented analysis and design approach using the UML. The system was implemented with Java as the frontend and processing logic, interacting with MySQL Server at the backend for transaction management. As generated from the University of Calabar Teaching Hospital Calabar, the result of this study shows that, with the fingerprint verification technique, mortuary establishments in Nigeria and related countries can enhance the deceased claimant verification process to avoid releasing the deceased to wrong persons and reduce deceased identification anomalies. The study has shown that biometrics technology can enhance deceased identification and release in resource-constrained settings like Nigeria.
Iwara I. Arikpo, Chidalu Prince Egeonu," Improving Deceased Identification and Claiming System in Mortuaries Using Fingerprint: A Developing Country Perspective ", International Journal of Mathematical Sciences and Computing(IJMSC), Vol.7, No.4, pp. 32-42, 2021. DOI: 10.5815/ijmsc.2021.04.04
[1]J. Kazungu, M. Nanyingi, S. P. Katongole, A. R. Ddm, and L. N. Wampande, ‘The State of Mortuary and Mortuary Services in Public Health Facilities of South Western Uganda’, Int. J. Public Health Res., vol. 3, no. 6, Art. no. 6, Nov. 2015.
[2]G. D. Mogli, ‘Role of Biometrics in Healthcare Privacy and Security Management System’, Sri Lanka J. Bio-Med. Inform., vol. 2, no. 4, p. 156, Jun. 2012, doi: 10.4038/sljbmi.v2i4.2245.
[3]M. Khartanovich, ‘The case against traditional passwords — and how biometrics can better secure us’, TNW | Syndication, Oct. 02, 2019. https://thenextweb.com/news/the-case-against-traditional-passwords-and-how-biometrics-can-better-secure-us (accessed Jun. 08, 2021).
[4]A. K. Jain, A. Ross, and S. Pankanti, ‘Biometrics: a tool for information security: IEEE Transactions on Information Forensics and Security: Vol 1, No 2’, 2006. https://dl.acm.org/doi/abs/10.1109/TIFS.2006.873653 (accessed Jun. 08, 2021).
[5]S. Rao and K. J. Satoa, ‘An Attendance Monitoring System Using Biometrics Authentication’, Int. J. Adv. Res. Comput. Sci. Softw. Eng., vol. 3, no. 4, pp. 379–383, 2013.
[6]K. Vignesh, S. S., and A. Sumithra, ‘A Foolproof Biometric Attendance Management System - PDF Free Download’, Int. J. Inf. Comput. Technol., vol. 3, no. 5, pp. 433–438, 2013.
[7]Mortuary Science, ‘Mortuary science - Wikipedia’, 2011. https://en.wikipedia.org/wiki/Mortuary_science (accessed Jun. 08, 2021).
[8]Hospital Authority, ‘Hospital Authority Quality and Risk Management Annual Report (Apr 13 - Mar 14) - PDF Free Download’, 2013. https://docplayer.net/14812085-Hospital-authority-quality-and-risk-management-annual-report-2013-2014-apr-13-mar-14.html (accessed Jun. 08, 2021).
[9]K. Fakhroutdinov, ‘UML 2.5 Diagrams Overview’, 2016. https://www.uml-diagrams.org/uml-25-diagrams.html (accessed Jun. 08, 2021).
[10]L. Favre, ‘UML and the Unified Process’, 2003. https://ng1lib.org/book/487821/60643d?id=487821&secret=60643d (accessed Jun. 08, 2021).