April 2, 2007 14:42 World Scientific Review Volume - 9in x 6in Main˙WorldSc˙IPR˙SAB
390 Synthesis and Analysis in Biometrics
function is also useful for predictive analysis both in the PASS and the
training system.
15.4. Training System Design
Prototyping a training system is based on functional analysis, which
includes design analysis and system synthesis. Design analysis aims at
establishing requirements, specifications, and design evaluation criteria
for the designed system. System synthesis is the translation of system
requirements and functions into hardware and software specifications.
15.4.1. Desired Characteristics
T-PASS is distinguished from existing training systems by many features,
which can be grouped with respect to architectural, topological, functional,
communication, cost, and other criteria. To minimize cost, T-PASS
utilizes PASS architectural principles and related characteristics and
functionalities. Below, a sample of components and desired characteristics
of T-PASS are given:
Screening, which is widely used in applications such as airport checkpoints,
facilities access, etc.
Decision making support. A knowledge intensive technique can be useful.
However, alternative techniques can be applied to achieve the same
but more cost-efficient result (we used multi-valued logic and decision
diagram techniques
[
49
]
)
Real-world conditions of training, which is accomplished by the reconfigu-
ration of PASS into the training system using minimal extra tools.
Flexibility, the extent to which the system can accommodate changes to
the tasks and environments beyond those first specified.
Expandability and adaptibility. In the proposed training system, the basic
configuration includes tools for generation of early warning data using
visible and IR images, and tools for generation of other synthetic
biometrics. The first will model the pre-screening process, and the
second will model the authorization process at the check-desk.
Early warning, that is, the ability to get preliminary information about
an individual, and in this way to reserve extra time for analysis of data
before authorization.
Multiprocessor and distributed configuration. Three main information
streams should be processing in real time: pre-screening data, screening
data, and data from local and global databases.