602 research outputs found

    Overview of Proposed Exchange, Medicaid and IRS Regulations

    Get PDF
    Explains the implications of draft regulations on Medicaid, health insurance exchanges, and premium tax credits under healthcare reform, including eligibility criteria, enrollment, and verification; minimum essential coverage; and credit computation

    Assessing the Effectiveness of a Fingerprint Biometric and a Biometric Personal Identification Number (BIO-PIN™) when used as a Multi-Factor Authentication Mechanism

    Get PDF
    The issue of traditional user authentication methods, such as username/passwords, when accessing information systems, the Internet, and Web-based applications still pose significant vulnerabilities. The problem of user authentication including physical and logical access appears to have limited, if any, coverage in research from the perspective of biometric as ‘something the user knows.’ Previous methods of establishing ones’ identity by using a password, or presenting a token or identification (ID) card are vulnerable to circumvention by misplacement or unauthorized sharing. The need for reliable user authentication techniques has increased in the wake of heightened concerns about information security and rapid advancements in networking, communication, and mobility. The main goal of this research study was to examine the role of the authentication method (BIO-PIN™ or username/password) and time, on the effectiveness of authentication, as well as the users’ ability to remember the BIO-PIN™ versus username/password (UN/PW). Moreover, this study compared the BIO-PIN™ with a traditional multi-factor biometric authentication using multiple fingerprints (without sequence) and a numerical PIN sequence (noted as BIO+PIN ). Additionally, this research study examined the authentication methods when controlled for age, gender, user’s computer experience, and number of accounts. This study used a quasi-experimental multiple baseline design method to evaluate the effectiveness of the BIO-PIN™ authentication method. The independent, dependent, and control variables were addressed using descriptive statistics and Multivariate Analysis of Variance (MANOVA) statistical analysis to compare the BIO-PIN™, the BIO+PIN, and UN/PW authentication methods for research questions (RQs) 1 and 2. Additionally, the Multivariate Analysis of Covariance (MANCOVA) was used to address RQ 3 and RQ4, which seeks to test any differences when controlled by age, gender, user experience, and number of accounts. This research study was conducted over a 10-week period with participant engagement occurring over time including a registration week and in intervals of 2 weeks, 3 weeks, and 5 weeks. This study advances the current research in multi-factor biometric authentication and increases the body of knowledge regarding users’ ability to remember industry standard UN/PWs, the BIO-PIN™ sequence, and traditional BIO+PIN

    Toward a Theory of Multi-Method Modeling and Simulation Approach

    Get PDF
    The representation via simulation models can easily lead to simulation models too simple for their intended purpose, or with too much detail, making them hard to understand. This problem is related to limitations of the modeling and simulation methods. A multi-method Modeling and Simulation (M&S) approach has the potential for improved representation by taking advantage of methods\u27 strengths and mitigating their weaknesses. Despite a high appeal for using multiple M&S methods, several related problems should be addressed first. The current level of theoretical, methodological, and pragmatic knowledge related to a multi-method M&S approach is limited. It is problematic that there is no clearly identified purpose and definition of the multi-method M&S approach. Theoretical and methodological advances are vital to enhancing the application of a multi-method M&S approach to address a broader range of scientific inquiries, improve quality of research, and enable finding common ground between scientific domains. This dissertation explored theoretical principles and research guidelines of a multi-method M&S approach. The analyzed literature offered perspectives related to the purpose, terms, and research guidelines of a multi-method M&S approach. A pragmatic philosophical stance was used to provide the basis for the choice of terms and definitions relevant to a multi-method M&S approach were proposed. The degrees of falsifiability are adapted to the M&S domain, which allowed for developing complementarity principles as the theoretical basis of a multi-method M&S approach. Next, a blueprint of a multi-method M&S approach called method formats was derived, because transitions toward formats must seek justifications in order to increase research objectivity and transparency. A sample set of methods was explored in the context of a proposed sample set of criteria. None of the methods were evaluated with the maximum score for every criterion, which implied that if all those characteristics were required within a research context, then, none of the methods could provide the highest possible score without combining methods. Finally, a case study that included a multi-method simulation model was developed, providing a data layer for evaluation of complementarity principles. The case study contributed to the credibility of complementarity principles as a reason to use a multi-method M&S approach and value of pseudo-triangulation as a mean of verification of a selected approach

    A statistical approach towards performance analysis of multimodal biometrics systems

    Get PDF
    Fueled by recent government mandates to deliver public functions by the use of biometrics, multimodal biometrics authentication has made rapid progress over the past a few years. Performance of multimodal biometrics systems plays a crucial role in government applications, including public security and forensic analysis. However, current performance analysis is conducted without considering the influence of noises, which may result in unreliable analytical results when noise levels change in practice. This thesis investigates the application of statistical methods in performance analysis of multimodal biometric systems. It develops an efficient and systematic approach to evaluate system performance in different situations of noise influences. Using this approach, 126 experiments are conducted with the BSSR1 dataset. The proposed approach helps to examine the performance of typical fusion methods that use different normalization and data partitioning techniques. Experiment results demonstrate that the Simple Sum fusion method working with the Min-Max normalization and Re-Substitution data partitioning yields the best overall performance in different noise conditions. In addition, further examination of the results reveals the need of systematic analysis of system performance as the performance of some fusion methods exhibits big variations when the level of noises changes and some fusion methods may produce very good performance in some application though normally unacceptable in others

    Development of a Facial Recognition System with Email Identification Message Relay Mechanism

    Get PDF
    Attendance records play a vital role in the educational sector. It is so vital that students are not allowed to sit for examinations if they do not meet the class attendance benchmark. But students, instead of making sure they attend classes regularly, devise cunny ways of committing attendance fraud. This unpleasant trend has made it necessary to develop systems that can take accurate class attendance records and minimize fraud. The use of biometrics to develop attendance taking systems is becoming quite popular. One of such biometrics is The Face. In this paper, a facial recognition algorithm known as Fisherfaces or Fisher Discriminant Analysis (FDA) which is not sensitive to substantial variation in facial look and illumination is used to develop the facial recognition attendance taking system. The system implemented has a training database of Ten (10) students. Ten (10) facial images of each student are taken with different composures, looks and under different levels of illumination. Tests on nine (9) students in the database yielded accuracies of as low as 70% and as high as 90%. This validates the proof that the more the number of training facial image in the database, the higher the accuracy of Fisherfaces approach. The simple mail transfer protocol (SMTP) was interfaced with the database to send identification messages (name of student identified with time and date of identification) to the email address of the administrator (in this case the lecturer) in realtime to effectively monitor the attendance. The result was found capable of eliminating attendance fraud

    IDレス生体認証における安全性と利便性の最適化に関する研究

    Get PDF
    学位の種別:課程博士University of Tokyo(東京大学

    TennCare and TennCare Partners- Success or Failure?

    Get PDF

    Device profiling analysis in Device-Aware Network

    Get PDF
    As more and more devices with a variety of capabilities are Internet-capable, device independence becomes a big issue when we would like the information that we request to be correctly displayed. This thesis introduces and compares how existing standards create a profile that describes the device capabilities to achieve the goal of device independence. After acknowledging the importance of device independence, this paper utilizes the idea to introduce a Device-Aware Network (DAN). DAN provides the infrastructure support for device-content compatibility matching for data transmission. We identify the major components of the DAN architecture and issues associated with providing this new network service. A Device-Aware Network will improve the network's efficiency by preventing unusable data from consuming host and network resources. The device profile is the key issue to achieve this goal.http://archive.org/details/deviceprofilingn109451301Captain, Taiwan ArmyApproved for public release; distribution is unlimited
    corecore