7,917 research outputs found
Rising stars in information and communication technology
The quest for more efficiency and security is reflected in the economy as a whole, but especially in the product and process innovations in information and communication technology (ICT). We examine the ten concepts considered to have the brightest prospects in the business segment in terms of their potential to gain widespread use during this decade. Out of these, the three most promising ICT approaches are biometrics, open-source software and radio tagging (RFID).internet telephony (VoIP), advanced mobile radio technology (WLAN, UMTS, WiMax), biometrics, quantum cryptography, Model information and communication technology (ICT), Driven Archi-tecture (MDA), decentralised storage (ILM), decentralised data process-ing (grid computing), open-source software, outsourcing, and radio tag-ging (RFID)
Using portfolio optimisation to calculate the efficient relationship between maritime port security residual risk and security investment
The research employs an adaptive cross-disciplinary research strategy in an industrial example to address container port facilities’ inability to assess whether their security systems are efficient. The research combines subjective assessments of the performances of the port facilities’ security systems with estimates of terrorism risk from a specialist terrorism underwriter. The research constructs the optimum theoretical portfolio of the three different security systems (access control, biometrics and detection systems) drawn from six different container port facilities owned by a major international ports company to calculate the efficient relationship between maritime port security residual risk and security investment. The research builds on the existing literature and proposes new definitions of security, port security, port security risk and port security risk management. The research also highlights the managerial impact of a chief financial officer’s ability to assess the efficiency of security budget allocation through the residual risk – security investment ratio. The contribution which the research makes is in terms of modelling and measurement of the impact of the introduction of new port security technology and changes to background port security threat levels. The research also juxtaposes for the first time the performance of port security systems with estimates of terrorism risk from a specialist Lloyd’s terrorism underwriter
Feature Representation for Online Signature Verification
Biometrics systems have been used in a wide range of applications and have
improved people authentication. Signature verification is one of the most
common biometric methods with techniques that employ various specifications of
a signature. Recently, deep learning has achieved great success in many fields,
such as image, sounds and text processing. In this paper, deep learning method
has been used for feature extraction and feature selection.Comment: 10 pages, 10 figures, Submitted to IEEE Transactions on Information
Forensics and Securit
Quantum surveillance and 'shared secrets'. A biometric step too far? CEPS Liberty and Security in Europe, July 2010
It is no longer sensible to regard biometrics as having neutral socio-economic, legal and political impacts. Newer generation biometrics are fluid and include behavioural and emotional data that can be combined with other data. Therefore, a range of issues needs to be reviewed in light of the increasing privatisation of ‘security’ that escapes effective, democratic parliamentary and regulatory control and oversight at national, international and EU levels, argues Juliet Lodge, Professor and co-Director of the Jean Monnet European Centre of Excellence at the University of Leeds, U
Applications of Automated Identification Technology in EHR/EMR
Although both the electronic health record (EHR) and the electronic medical record (EMR) store an individuals computerized health information and the terminologies are often used interchangeably, there are some differences between them. Three primary approaches in Automated Identification Technology (AIT) are barcoding, radio frequency identification (RFID), and biometrics. In this paper, technology intelligence, progress, limitations, and challenges of EHR/EMR are introduced. The applications and challenges of barcoding, RFID, and biometrics in EHR/EMR are presented respectively
Choosing two technologies that best suite for making voter ID card
This thesis report is submitted in partial fulfillment of the requirements for the degree of Bachelor of Science in Computer Science and Engineering, 2008.Cataloged from PDF version of thesis report.Includes bibliographical references (page 31).Voting is an important national issue for every country and the whole voting process should be flawless and secured. To ensure free and fair election, Bangladesh needs a voting system where people can vote without any influence and faultlessness. Existing manual voting system has limitation and gives room for the politicians to influence voters and the people to vote in their favor and thereby it makes the voting system unfair. Such a situation can be overcome through some automated system like electronic Voter ID card making. In this
thesis we have chosen two technologies that best suit for making a secured Voter ID card which ultimately contributes to a proper voting system. The first technology is RFID and the second one is BIOMETRICS. This thesis provides a brief idea of how these technologies work, what are the core features of them and how they are going to be applied for making Voter ID card. We have done
simulations for both RFID and Biometrics. It seems simulation results are
influential in applying these sophisticated technologies in practical field.Afzal AftabMd. Tareq AbdullahB. Computer Science and Engineerin
RECENT ADVANCEMENTS IN EAR BIOMETRICS: A REVIEW
Ascertaining the identity of a person is quite an important aspect of Forensic Science. There are so many physiological features have been proved to be highly discriminating among individuals. Biometrics play a significant role in individualizing a person. Fingerprint, Palm print, Retina and Iris recognition are the most popular examples of it. Fingerprint and iris are generally considered to allow more accurate biometric recognition than the face, but the face is more easily used in surveillance scenarios where fingerprint and iris capture are not feasible. However, the face by itself is not yet as accurate and flexible as desired for this scenario due to expression changes, source of illumination, make-up, etc. Besides these limitations, ear images can be acquired in a similar manner to face images. A number of researchers have suggested that the human ear is unique enough to each individual to allow practical use as a biometric. In this article an attempt has been made to review all the recent researches of a decade made in the field of Ear Biometrics
- …