161 research outputs found
Identification and Security Implications of Biometrics
The usage of biometrics has become more frequent over the past couple of decades, notably due to technological advancements. Evolving technology in the field of biometrics has also led to increased accuracy of associated software, which have provided the opportunity to use a multitude of different human characteristics for identification and/or verification purposes. The current study assessed the usage of biometrics in casinos, hospitals, and law enforcement agencies using a survey methodology. Results indicated that privacy concerns related to the use of biometrics may not be as prevalent as indicated in the literature. Additionally, results indicated that the utilization of biometrics has led to increased accuracy in identification and verification processes, led to enhanced security, and would be highly recommended to other institutions. Information obtained from the literature notes the racial bias in facial recognition technologies due to algorithmic development based solely upon features of Caucasian individuals. Efforts need to be made to create facial recognition algorithms that are more racially and ethnically diverse
Novel neural approaches to data topology analysis and telemedicine
1noL'abstract è presente nell'allegato / the abstract is in the attachmentopen676. INGEGNERIA ELETTRICAnoopenRandazzo, Vincenz
Security Enhanced Applications for Information Systems
Every day, more users access services and electronically transmit information which is usually disseminated over insecure networks and processed by websites and databases, which lack proper security protection mechanisms and tools. This may have an impact on both the users’ trust as well as the reputation of the system’s stakeholders. Designing and implementing security enhanced systems is of vital importance. Therefore, this book aims to present a number of innovative security enhanced applications. It is titled “Security Enhanced Applications for Information Systems” and includes 11 chapters. This book is a quality guide for teaching purposes as well as for young researchers since it presents leading innovative contributions on security enhanced applications on various Information Systems. It involves cases based on the standalone, network and Cloud environments
Radial Basis Function Neural Network in Identifying The Types of Mangoes
Mango (Mangifera Indica L) is part of a fruit
plant species that have different color and texture
characteristics to indicate its type. The identification of the
types of mangoes uses the manual method through direct visual
observation of mangoes to be classified. At the same time, the
more subjective way humans work causes differences in their
determination. Therefore in the use of information technology,
it is possible to classify mangoes based on their texture using a
computerized system. In its completion, the acquisition process
is using the camera as an image processing instrument of the
recorded images. To determine the pattern of mango data
taken from several samples of texture features using Gabor
filters from various types of mangoes and the value of the
feature extraction results through artificial neural networks
(ANN). Using the Radial Base Function method, which
produces weight values, is then used as a process for classifying
types of mangoes. The accuracy of the test results obtained
from the use of extraction methods and existing learning
methods is 100%
Biometrics & [and] Security:Combining Fingerprints, Smart Cards and Cryptography
Since the beginning of this brand new century, and especially since the 2001 Sept 11 events in the U.S, several biometric technologies are considered mature enough to be a new tool for security. Generally associated to a personal device for privacy protection, biometric references are stored in secured electronic devices such as smart cards, and systems are using cryptographic tools to communicate with the smart card and securely exchange biometric data. After a general introduction about biometrics, smart cards and cryptography, a second part will introduce our work with fake finger attacks on fingerprint sensors and tests done with different materials. The third part will present our approach for a lightweight fingerprint recognition algorithm for smart cards. The fourth part will detail security protocols used in different applications such as Personal Identity Verification cards. We will discuss our implementation such as the one we developed for the NIST to be used in PIV smart cards. Finally, a fifth part will address Cryptography-Biometrics interaction. We will highlight the antagonism between Cryptography – determinism, stable data – and Biometrics – statistical, error-prone –. Then we will present our application of challenge-response protocol to biometric data for easing the fingerprint recognition process
Deep Learning Detected Nutrient Deficiency in Chili Plant
Chili is a staple commodity that also affects the Indonesian economy due to high market demand.
Proven in June 2019, chili is a contributor to Indonesia's inflation of 0.20% from 0.55%. One
factor is crop failure due to malnutrition. In this study, the aim is to explore Deep Learning
Technology in agriculture to help farmers be able to diagnose their plants, so that their plants
are not malnourished. Using the RCNN algorithm as the architecture of this system. Use 270
datasets in 4 categories. The dataset used is primary data with chili samples in Boyolali Regency,
Indonesia. The chili we use are curly chili. The results of this study are computers that can
recognize nutrient deficiencies in chili plants based on image input received with the greatest
testing accuracy of 82.61% and has the best mAP value of 15.57%
Appraisal of Cashless Policy on the Nigerian Financial System
The Central Bank of Nigeria (CBN) has been active in the inauguration of policies and schemes to foster the
implementation of the cashless policy in Nigeria. However the current transition to cashless economy raises
a lot of concerns with no substantial evidence yet to justify its implementation. This study was carried out in
order to appraise the implementation of the cashless policy since its introduction into the Nigerian financial
system in 2012 and also to examine the persistent challenges facing its implementation. In view of the above
stated objective, primary data were collected with the aid of the questionnaire, which was randomly
administered to 120 respondents ranging from First Bank, Zenith Bank and United Bank for Africa. The
banks were selected based on their total assets and the information collected covered the activities of the
CBN and that of these banks towards implementation of the cashless policy from 2012 till date.The data
collected were presented and analyzed with the aid of the Statistical Package for Social Sciences (SPSS)
using descriptive statistics and one-sample t-test. The results led to the conclusion that despite the need to
operate cashless transactions dominating the modern Nigerian economy, the cashless policy will have the
desired impact only if a lot is done to ensure the implementation of an effective cashless system
Biometric Systems
Because of the accelerating progress in biometrics research and the latest nation-state threats to security, this book's publication is not only timely but also much needed. This volume contains seventeen peer-reviewed chapters reporting the state of the art in biometrics research: security issues, signature verification, fingerprint identification, wrist vascular biometrics, ear detection, face detection and identification (including a new survey of face recognition), person re-identification, electrocardiogram (ECT) recognition, and several multi-modal systems. This book will be a valuable resource for graduate students, engineers, and researchers interested in understanding and investigating this important field of study
- …