1,224 research outputs found

    ICFHR 2020 Competition on Short answer ASsessment and Thai student SIGnature and Name COMponents Recognition and Verification (SASIGCOM 2020)

    Full text link
    This paper describes the results of the competition on Short answer ASsessment and Thai student SIGnature and Name COMponents Recognition and Verification (SASIGCOM 2020) in conjunction with the 17th International Conference on Frontiers in Handwriting Recognition (ICFHR 2020). The competition was aimed to automate the evaluation process short answer-based examination and record the development and gain attention to such system. The proposed competition contains three elements which are short answer assessment (recognition and marking the answers to short-answer questions derived from examination papers), student name components (first and last names) and signature verification and recognition. Signatures and name components data were collected from 100 volunteers. For the Thai signature dataset, there are 30 genuine signatures, 12 skilled and 12 simple forgeries for each writer. With Thai name components dataset, there are 30 genuine and 12 skilfully forged name components for each writer. There are 104 exam papers in the short answer assessment dataset, 52 of which were written with cursive handwriting; the rest of 52 papers were written with printed handwriting. The exam papers contain ten questions, and the answers to the questions were designed to be a few words per question. Three teams from distinguished labs submitted their systems. For short answer assessment, word spotting task was also performed. This paper analysed the results produced by their algorithms using a performance measure and defines a way forward for this subject of research. Both the datasets, along with some of the accompanying ground truth/baseline mask will be made freely available for research purposes via the TC10/TC11

    A GENERIC ARCHITECTURE FOR INSIDER MISUSE MONITORING IN IT SYSTEMS

    Get PDF
    Intrusion Detection Systems (IDS) have been widely deployed within many organisations' IT nenvorks to delect network penetration attacks by outsiders and privilege escalation attacks by insiders. However, traditional IDS are ineffective for detecting o f abuse o f legitimate privileges by authorised users within the organisation i.e. the detection of misfeasance. In essence insider IT abuse does not violate system level controls, yet violates acceptable usage policy, business controls, or code of conduct defined by the organisation. However, the acceptable usage policy can vary from one organisation to another, and the acceptability o f user activities can also change depending upon the user(s), application, machine, data, and other contextual conditions associated with the entities involved. The fact that the perpetrators are authorised users and that the insider misuse activities do not violate system level controls makes detection of insider abuse more complicated than detection o f attacks by outsiders. The overall aim o f the research is to determine novel methods by which monitoring and detection may be improved to enable successful detection of insider IT abuse. The discussion begins with a comprehensive investigation o f insider IT misuse, encompassing the breadth and scale of the problem. Consideration is then given to the sufficiency of existing safeguards, with the conclusion that they provide an inadequate basis for detecting many o f the problems. This finding is used as the justification for considering research into alternative approaches. The realisation of the research objective includes the development of a taxonomy for identification o f various levels within the system from which the relevant data associated with each type of misuse can be collected, and formulation of a checklist for identification of applications that requires misfeasor monitoring. Based upon this foundation a novel architecture for monitoring o f insider IT misuse, has been designed. The design offers new analysis procedures to be added, while providing methods to include relevant contextual parameters from dispersed systems for analysis and reference. The proposed system differs from existing IDS in the way that it focuses on detecting contextual misuse of authorised privileges and legitimate operations, rather than detecting exploitation o f network protocols and system level \ailnerabilities. The main concepts of the new architecture were validated through a proof-of-concept prototype system. A number o f case scenarios were used to demonstrate the validity of analysis procedures developed and how the contextual data from dispersed databases can be used for analysis of various types of insider activities. This helped prove that the existing detection technologies can be adopted for detection o f insider IT misuse, and that the research has thus provided valuable contribution to the domain

    Safe Migration and the Politics of Brokered Safety in Southeast Asia

    Get PDF
    The book investigates how the United Nations, governments, and aid agencies mobilise and instrumentalise migration policies and programmes through a discourse of safe migration. Since the early 2000s, numerous non-governmental organizations (NGOs), UN agencies, and governments have warmed to the concept of safe migration, often within a context of anti-trafficking interventions. Yet, both the policy-enthusiasm for safety, as well as how safe migration comes into being through policies and programs remain unexplored. Based on seven years of ethnographic fieldwork in the Mekong region, this is the first book that traces the emergence of safe migration, why certain aid actors gravitate towards the concept, as well as how safe migration policies and programmes unfold through aid agencies and government bodies. The book argues that safe migration is best understood as brokered safety. Although safe migration policy interventions attempt to formalize pre-emptive and protective measures to enhance labour migrants’ well-being, the book shows through vivid ethnographic details how formal migration assistance in itself depends on – and produces – informal asnd mediated practices. The book offers unprecedented insights into what safe migration policies look like in practice. It is an innovate contribution to contemporary theorizing of contemporary forms of migration governance and will be of interest to sociologists, anthropologists, political scientists, and human geographers working within the fields of Migration studies, Development Studies, as well as Southeast Asian and Global Studies. The Open Access version of this book, available at http://www.taylorfrancis.com/books/e/9781003185734 has been made available under a Creative Commons Attribution-Non Commercial-No Derivatives 4.0 license

    Non-Intrusive Continuous User Authentication for Mobile Devices

    Get PDF
    The modern mobile device has become an everyday tool for users and business. Technological advancements in the device itself and the networks that connect them have enabled a range of services and data access which have introduced a subsequent increased security risk. Given the latter, the security requirements need to be re-evaluated and authentication is a key countermeasure in this regard. However, it has traditionally been poorly served and would benefit from research to better understand how authentication can be provided to establish sufficient trust. This thesis investigates the security requirements of mobile devices through literature as well as acquiring the user’s perspectives. Given the findings it proposes biometric authentication as a means to establish a more trustworthy approach to user authentication and considers the applicability and topology considerations. Given the different risk and requirements, an authentication framework that offers transparent and continuous is developed. A thorough end-user evaluation of the model demonstrates many positive aspects of transparent authentication. The technical evaluation however, does raise a number of operational challenges that are difficult to achieve in a practical deployment. The research continues to model and simulate the operation of the framework in an controlled environment seeking to identify and correlate the key attributes of the system. Based upon these results and a number of novel adaptations are proposed to overcome the operational challenges and improve upon the impostor detection rate. The new approach to the framework simplifies the approach significantly and improves upon the security of the system, whilst maintaining an acceptable level of usability

    Biometrics

    Get PDF
    Biometrics-Unique and Diverse Applications in Nature, Science, and Technology provides a unique sampling of the diverse ways in which biometrics is integrated into our lives and our technology. From time immemorial, we as humans have been intrigued by, perplexed by, and entertained by observing and analyzing ourselves and the natural world around us. Science and technology have evolved to a point where we can empirically record a measure of a biological or behavioral feature and use it for recognizing patterns, trends, and or discrete phenomena, such as individuals' and this is what biometrics is all about. Understanding some of the ways in which we use biometrics and for what specific purposes is what this book is all about

    Selected Computing Research Papers Volume 6 June 2017

    Get PDF
    Critical Analysis of Online Transaction Verification Technologies in Financial Industries (Baboni Mmaopinkie Beleng) .............................................................................. 1 Improving the Effectiveness of Network Security Training Using Experimental Programmes (John Bolam) ................................................................................................... 9 A Critical Evaluation of the Effectiveness of Animation within Education (Frances Byers) .................................................................................................................................. 15 Evaluating Current Research on the Educational Effectiveness of Augmented Reality (Michael Jopling) ................................................................................................................ 21 A Critical Evaluation of Current Research in DDoS Filtering Techniques within Cloud Computing Environments (Dean Richard McKinnel) ............................................. 27 An Evaluation of Security Strategies Aimed At Improving Cloud Computing (Gofaone Oatile) ................................................................................................................. 35 An Evaluation of Current Research into the Potential Negative Impact from Violent Video Games on Teenagers’ Aggression (Christopher Riddell) ........................................ 43 Evaluation of Current Computing Research Aimed at Improving Fingerprint Recognition Systems (Shaun Nkgasapane) ........................................................................ 49 A Critical Evaluation of Current Research into Improving Botnet Detection Rates (Andrew Thompson) ........................................................................................................... 5

    RFID Technology in Intelligent Tracking Systems in Construction Waste Logistics Using Optimisation Techniques

    Get PDF
    Construction waste disposal is an urgent issue for protecting our environment. This paper proposes a waste management system and illustrates the work process using plasterboard waste as an example, which creates a hazardous gas when land filled with household waste, and for which the recycling rate is less than 10% in the UK. The proposed system integrates RFID technology, Rule-Based Reasoning, Ant Colony optimization and knowledge technology for auditing and tracking plasterboard waste, guiding the operation staff, arranging vehicles, schedule planning, and also provides evidence to verify its disposal. It h relies on RFID equipment for collecting logistical data and uses digital imaging equipment to give further evidence; the reasoning core in the third layer is responsible for generating schedules and route plans and guidance, and the last layer delivers the result to inform users. The paper firstly introduces the current plasterboard disposal situation and addresses the logistical problem that is now the main barrier to a higher recycling rate, followed by discussion of the proposed system in terms of both system level structure and process structure. And finally, an example scenario will be given to illustrate the system’s utilization

    Non-Intrusive Subscriber Authentication for Next Generation Mobile Communication Systems

    Get PDF
    Merged with duplicate record 10026.1/753 on 14.03.2017 by CS (TIS)The last decade has witnessed massive growth in both the technological development, and the consumer adoption of mobile devices such as mobile handsets and PDAs. The recent introduction of wideband mobile networks has enabled the deployment of new services with access to traditionally well protected personal data, such as banking details or medical records. Secure user access to this data has however remained a function of the mobile device's authentication system, which is only protected from masquerade abuse by the traditional PIN, originally designed to protect against telephony abuse. This thesis presents novel research in relation to advanced subscriber authentication for mobile devices. The research began by assessing the threat of masquerade attacks on such devices by way of a survey of end users. This revealed that the current methods of mobile authentication remain extensively unused, leaving terminals highly vulnerable to masquerade attack. Further investigation revealed that, in the context of the more advanced wideband enabled services, users are receptive to many advanced authentication techniques and principles, including the discipline of biometrics which naturally lends itself to the area of advanced subscriber based authentication. To address the requirement for a more personal authentication capable of being applied in a continuous context, a novel non-intrusive biometric authentication technique was conceived, drawn from the discrete disciplines of biometrics and Auditory Evoked Responses. The technique forms a hybrid multi-modal biometric where variations in the behavioural stimulus of the human voice (due to the propagation effects of acoustic waves within the human head), are used to verify the identity o f a user. The resulting approach is known as the Head Authentication Technique (HAT). Evaluation of the HAT authentication process is realised in two stages. Firstly, the generic authentication procedures of registration and verification are automated within a prototype implementation. Secondly, a HAT demonstrator is used to evaluate the authentication process through a series of experimental trials involving a representative user community. The results from the trials confirm that multiple HAT samples from the same user exhibit a high degree of correlation, yet samples between users exhibit a high degree of discrepancy. Statistical analysis of the prototypes performance realised early system error rates of; FNMR = 6% and FMR = 0.025%. The results clearly demonstrate the authentication capabilities of this novel biometric approach and the contribution this new work can make to the protection of subscriber data in next generation mobile networks.Orange Personal Communication Services Lt

    Improving the intersect of the power distribution system and the built environment in developing countries

    Get PDF
    Power distribution systems, specifically where they intersect with the built environment, are highly underemphasised versus generation in power planning. In a time of technology advances and cost declines in distribution automation and related technologies, this is an area of high potential for improving energy efficiency. This is particularly of impact in developing countries where urbanisation is rapidly increasing. Evidence shows that the same missed opportunities and sub-optimal distribution planning techniques are repeatedly found across multiple geographies. In this research, tools were developed to rank these problems and create solutions. These tools were endorsed by power industry executives from three countries. Following this, the tools were applied in a developing corridor near the Thailand-Cambodia border where power density is increasing, in order to develop power system solutions for live infrastructure projects. The solutions include technologies such as distributed generation, microgrids, digital monitoring systems, CCHP units, and power storage. The solutions from the live example were then honed and endorsed in an interview with Thai power sector experts. The final research and tools developed were confirmed capable of producing actionable solutions for planners across the public and private sectors, who focus on power distribution in urbanising, developing counties

    An investigation into how B2B decision-makers utilise resources in their marketing decision-making

    Get PDF
    Everyone makes decisions, some simple, others complex. In business-to-business (B2B) marketing environments, decision-making becomes even more complicated. The decision-makers require an adequate set of facts to support their decision-making. In order to provide the necessary decision-support, B2B organisations invest huge amounts of money in information systems such as enterprise resources planning applications, customer relationship management software, and other types of databases. These systems store, analyse, manipulate and/or integrate internal data and perhaps force-feed it to the decision-makers; what we call a foie-gras approach. On the other hand, organisations may allow the decision-makers to search for the desired facts or decision-support by themselves; what we refer to as anarchic resources utilisation. Alternatively, the decision-makers may utilise resources with a combination of the two approaches. Previous studies have shown that many factors may influence the resources utilisation; however, not many studies have been conducted in the B2B context. This research, therefore, aims to provide a better understanding of how decision-makers utilise the available resources by firstly identifying B2B factors affecting the resources utilisation, and then explaining how these factors influence them. Results from in-depth interviews with the marketing decision-makers from three case studies show that the value of customers, supplier-customer relationships, and the nature of demand are the most influential B2B factors affecting the resources utilisation of the decision-makers. Other factors such as experience, nature of decisions, and management style are also found to have considerable impact on the approach the decision-makers adopt. In order to provide adequate decision-support, the providers may need to consider these factors and understand their effects on the decision-makers in the organisation, and design or choose the right information system(s); this should then result in better quality decisions.EThOS - Electronic Theses Online ServiceGBUnited Kingdo
    corecore