References
[1]. Adebowale, T. O., Okiki, O. C., & Yakubu, E. D. (2013).
Circulation activities in tertiary institutions in Nigeria: a
discourse on circulation transactions of Yaba College of
Technology Librar y. Information and Knowledge
Management, 3(4), 24-31.
[2]. Bhattacharyya, D., Ranjan, R., Alisherov, F., & Choi, M.
(2009). Biometric authentication: A review. International
Journal of u-and e-Service, Science and Technology,
2(3), 13-28.
[3]. DigitalPersona (2007). DigitalPersona White Paper
Guide to Fingerprint Recognition. DigitalPersona, Inc.
[4]. Geer, H. T. (n.d). Charging machines. Retrieved from
https://pdfs.semanticscholar.org/d2b9/5761c1ee6e7c3
8a388e9c45b88afaf2788f7.pdf
[5]. Kumar, M., & Gouda, H. S. (2012). Fingerprint
recognition system to verify the identity of a person using
an online database (Doctoral dissertation). NIT Rourkela,
Odisha, India. Retrieved from https://ethesis.nitrkl.ac.in/
3732/1/FINAL_YEAR_PROJECT(108ei004-019).pdf
[6]. Merriam Webster Dictionary (2018). Newark Charging
S y s t em. Re t r i e v e d f r om h t t p s : / / w w w.me r r i amwebster.
com/dictionary/Newark%20charging%20system
[7]. Microsoft Encarta (2009). Cryptography. 1993-2008
Microsoft Corporation.
[8]. Mudholkar, S. S., Shende, P. M., & Sarode, M. V. (2012).
Biometrics authentication technique for intrusion
detection systems using fingerprint recognition.
International Journal of Computer Science, Engineering
and Information Technology (IJCSEIT), 2(1), 57-65.
[9]. Muyideen, A., Dayo, R. A., Kayode, S. A., & Kamaldeen, J.
M. (2014). Fingerprint biometric-based cryptographic system
as a security approach in grid environment. Journal of
Computations & Modelling, 4 (2), 41-58.
[10]. Prasathkumar, V., & Brindha, V. E. (2014). Personal
authentication using fingerprint biometric system.
International Journal of Innovative Research in Computer
and Communication Engineering. 2 (1), 1008-1014.
[11]. Rani, D. E., & Jose, J. J. R. (2016). Fingerprint based
biometric authentication. International Journal of
Computer Science and Mobile Computing, IJCSMC.
5(9), 6–15.
[12]. Rani, P. & Sharma, P. (2014). A review paper on
fingerprint identification system. International Journal of
Advanced Research in Computer Science & Technology
(IJARCST), 2 (3), 58-60.
[13]. Redhu, M., & Balkishan. (2013). Fingerprint
recognition using minutiae extractor. International
Journal of Engineering Research and Applications
(IJERA). 3 (4), 2488-2497.
[14]. Shafagat, M. (2016). Application opportunities of
Biometric technology in electron libraries.
Communications. 4 (2), 8-11.
[15]. ShodhGanga (2018). Charging of library materials.
Retrieved from https://shodhganga.inflibnet.ac.in/
bitstream/10603/131534/9/09_chapter%201.pdf
[16]. Subban, R., & Mankame, D. P. (2013). A study of
biometric approach using fingerprint recognition. Lecture
Notes on Software Engineering, 1 (2), 209-213.
[17]. Wikipedia (2018). Browne Issue System. Wikimedia
Foundations. https://en.wikipedia.org/wiki/Browne_
Issue_System