7,917 research outputs found

    Rising stars in information and communication technology

    Get PDF
    The quest for more efficiency and security is reflected in the economy as a whole, but especially in the product and process innovations in information and communication technology (ICT). We examine the ten concepts considered to have the brightest prospects in the business segment in terms of their potential to gain widespread use during this decade. Out of these, the three most promising ICT approaches are biometrics, open-source software and radio tagging (RFID).internet telephony (VoIP), advanced mobile radio technology (WLAN, UMTS, WiMax), biometrics, quantum cryptography, Model information and communication technology (ICT), Driven Archi-tecture (MDA), decentralised storage (ILM), decentralised data process-ing (grid computing), open-source software, outsourcing, and radio tag-ging (RFID)

    Using portfolio optimisation to calculate the efficient relationship between maritime port security residual risk and security investment

    Get PDF
    The research employs an adaptive cross-disciplinary research strategy in an industrial example to address container port facilities’ inability to assess whether their security systems are efficient. The research combines subjective assessments of the performances of the port facilities’ security systems with estimates of terrorism risk from a specialist terrorism underwriter. The research constructs the optimum theoretical portfolio of the three different security systems (access control, biometrics and detection systems) drawn from six different container port facilities owned by a major international ports company to calculate the efficient relationship between maritime port security residual risk and security investment. The research builds on the existing literature and proposes new definitions of security, port security, port security risk and port security risk management. The research also highlights the managerial impact of a chief financial officer’s ability to assess the efficiency of security budget allocation through the residual risk – security investment ratio. The contribution which the research makes is in terms of modelling and measurement of the impact of the introduction of new port security technology and changes to background port security threat levels. The research also juxtaposes for the first time the performance of port security systems with estimates of terrorism risk from a specialist Lloyd’s terrorism underwriter

    Feature Representation for Online Signature Verification

    Full text link
    Biometrics systems have been used in a wide range of applications and have improved people authentication. Signature verification is one of the most common biometric methods with techniques that employ various specifications of a signature. Recently, deep learning has achieved great success in many fields, such as image, sounds and text processing. In this paper, deep learning method has been used for feature extraction and feature selection.Comment: 10 pages, 10 figures, Submitted to IEEE Transactions on Information Forensics and Securit

    Quantum surveillance and 'shared secrets'. A biometric step too far? CEPS Liberty and Security in Europe, July 2010

    Get PDF
    It is no longer sensible to regard biometrics as having neutral socio-economic, legal and political impacts. Newer generation biometrics are fluid and include behavioural and emotional data that can be combined with other data. Therefore, a range of issues needs to be reviewed in light of the increasing privatisation of ‘security’ that escapes effective, democratic parliamentary and regulatory control and oversight at national, international and EU levels, argues Juliet Lodge, Professor and co-Director of the Jean Monnet European Centre of Excellence at the University of Leeds, U

    Hand Geometry Techniques: A Review

    Full text link
    Volume 2 Issue 11 (November 2014

    Applications of Automated Identification Technology in EHR/EMR

    Get PDF
    Although both the electronic health record (EHR) and the electronic medical record (EMR) store an individuals computerized health information and the terminologies are often used interchangeably, there are some differences between them. Three primary approaches in Automated Identification Technology (AIT) are barcoding, radio frequency identification (RFID), and biometrics. In this paper, technology intelligence, progress, limitations, and challenges of EHR/EMR are introduced. The applications and challenges of barcoding, RFID, and biometrics in EHR/EMR are presented respectively

    Choosing two technologies that best suite for making voter ID card

    Get PDF
    This thesis report is submitted in partial fulfillment of the requirements for the degree of Bachelor of Science in Computer Science and Engineering, 2008.Cataloged from PDF version of thesis report.Includes bibliographical references (page 31).Voting is an important national issue for every country and the whole voting process should be flawless and secured. To ensure free and fair election, Bangladesh needs a voting system where people can vote without any influence and faultlessness. Existing manual voting system has limitation and gives room for the politicians to influence voters and the people to vote in their favor and thereby it makes the voting system unfair. Such a situation can be overcome through some automated system like electronic Voter ID card making. In this thesis we have chosen two technologies that best suit for making a secured Voter ID card which ultimately contributes to a proper voting system. The first technology is RFID and the second one is BIOMETRICS. This thesis provides a brief idea of how these technologies work, what are the core features of them and how they are going to be applied for making Voter ID card. We have done simulations for both RFID and Biometrics. It seems simulation results are influential in applying these sophisticated technologies in practical field.Afzal AftabMd. Tareq AbdullahB. Computer Science and Engineerin

    RECENT ADVANCEMENTS IN EAR BIOMETRICS: A REVIEW

    Get PDF
    Ascertaining the identity of a person is quite an important aspect of Forensic Science. There are so many physiological features have been proved to be highly discriminating among individuals. Biometrics play a significant role in individualizing a person. Fingerprint, Palm print, Retina and Iris recognition are the most popular examples of it. Fingerprint and iris are generally considered to allow more accurate biometric recognition than the face, but the face is more easily used in surveillance scenarios where fingerprint and iris capture are not feasible. However, the face by itself is not yet as accurate and flexible as desired for this scenario due to expression changes, source of illumination, make-up, etc. Besides these limitations, ear images can be acquired in a similar manner to face images. A number of researchers have suggested that the human ear is unique enough to each individual to allow practical use as a biometric. In this article an attempt has been made to review all the recent researches of a decade made in the field of Ear Biometrics
    corecore