1,480 research outputs found

    Service Integration for Biometric Authentication

    Get PDF
    Unimodaalsete biomeetriliste süsteemide kasvav kasutuselevõtt era- ja riigiasutustes näitab biomeetriliste autentimissüsteemide edu. See aga ei tähenda, et biomeetrilised süsteemid pakuvad terviklikku autentimislahendust. Unimodaalsetes biomeetrilistes süsteemides ilmneb hulk piiranguid, mida on võimalik ületada kasutades multimodaalseid biomeetrilisi autentimissüsteeme. Multimodaalseid süsteeme peetakse töökindlamaks ja võimeliseks rahuldama rangeid jõudlusvajadusi. Lisaks võimaldavad multimodaalsed süsteemid arvestada mitteuniversaalsuse probleemiga ja tõhusalt tõrjuda võltsimisrünnakuid. Vaatamata suhtelistele eelistele on multimodaalsete biomeetriliste süsteemide realisatsioon ja kasutusmugavus jäänud fundamentaalseks väljakutseks tarkvaraarenduses. Multimodaalsed süsteemid on enamasti sulam unimodaalsetest süsteemidest, mis on valitud vastavalt äriprotsessi ja vaadeldava keskkonna nõuetele. Nende süsteemide mitmekesisus, lähtekoodi kättesaadavus ja juurutamisvajadused muudavad nende arenduse ja kasutuselevõtu oluliselt kulukamaks. Tarkvaraarendajatena üritame me lihtsustada arendusprotsessi ja minimeerides selleks vajamineva jõupingutuse suurust. Seetõttu keskendub see töö olemasolevate biomeetriliste süsteemide taaskasutatavaks muutmisele. Eesmärgiks on kirjeldada teenuste integratsiooni raamistik, mis automatiseerib heterogeensete biomeetriliste süsteemide sujuvat seadistamist ja paigaldust ning vähendab arenduse töömahtu ja sellega seotud kulutusi. Selle eesmärgi saavutamiseks kõrvaldame me vajaduse korduva stsenaariumipõhise ühilduvate süsteemide arenduse ja integratsiooni järgi. Biomeetriliste süsteemide arendus muudetakse ühekordseks tööks. Me esitleme ka vahendeid heterogeensetest avatud lähetekoodiga ja kommerts biomeetrilistest süsteemidest koosnevate multimodaalsete biomeetriliste süsteemide seadistamiseks ja paigaldamiseks lähtuvalt valdkonnaspetsiifilistest autentimisvajadustest. Võrreldes levinud praktikatega vähendab meie lähenemine stsenaariumi-spetsiifilise biomeetrilise autentimissüsteemi arendusele ja paigaldusele kuluvat töö hulka 46,42%.The success of biometric authentication systems is evident from the increasing rate of adoption of unimodal biometric systems in civil and governmental applications. However, this does not imply that biometric systems offer a complete authentication solution. Unimodal biometric systems exhibit a multitude of limitations which can be overcome by using multimodal biometric authentication systems. Multimodal systems are considered more reliable, and capable of meeting stringent performance needs and addressing the problem of non-universality and spoof attacks effectively. Despite the relative advantages, implementation and usability of multimodal biometric systems remain a fundamental software engineering challenge. Multimodal systems are usually an amalgamation of unimodal biometric systems chosen in accordance with the needs dictated by the business process(es) and the respective environment under consideration. The heterogeneity, availability of source code, and deployment needs for these systems incur significantly higher development and adaption costs. Being software engineers, we naturally strive to simplify the engineering process and minimize the required amount of effort. Therefore this work focuses on making the existing biometric systems reusable. The objective is to define a service integration framework which automates seamless configuration, and deployment of heterogeneous biometric systems, and minimizes the development effort and related costs. In this effort we replace the need for development and integration of scenario-specific compatible systems by repetitive scenario-specific configuration and deployment of multimodal biometric systems. The development of biometric systems is minimized to a one-time effort. We also present tools for configuration and deployment, which respectively configure and deploy multimodal biometric systems comprising of heterogeneous open source and/or commercial biometric systems required for fulfillment of domain specific authentication needs. In comparison to the prevalent practices, our approach reduces the effort required for developing and deploying reliable scenario-specific biometric authentication systems by 46.42%

    Verifying traits: an incremental proof system for fine-grained reuse

    Get PDF

    Unwoven Aspect Analysis

    Get PDF
    Various languages and tools supporting advanced separation of concerns (such as aspect-oriented programming) provide a software developer with the ability to separate functional and non-functional programmatic intentions. Once these separate pieces of the software have been specified, the tools automatically handle interaction points between separate modules, relieving the developer of this chore and permitting more understandable, maintainable code. Many approaches have left traditional compiler analysis and optimization until after the composition has been performed; unfortunately, analyses performed after composition cannot make use of the logical separation present in the original program. Further, for modular systems that can be configured with different sets of features, testing under every possible combination of features may be necessary and time-consuming to avoid bugs in production software. To solve this testing problem, we investigate a feature-aware compiler analysis that runs during composition and discovers features strongly independent of each other. When the their independence can be judged, the number of feature combinations that must be separately tested can be reduced. We develop this approach and discuss our implementation. We look forward to future programming languages in two ways: we implement solutions to problems that are conceptually aspect-oriented but for which current aspect languages and tools fail. We study these cases and consider what language designs might provide even more information to a compiler. We describe some features that such a future language might have, based on our observations of current language deficiencies and our experience with compilers for these languages

    Indonesian Women and Islamic Economy: A Case Study of Islamic Microfinance and Women's Empowerment in Yogyakarta

    Get PDF
    Baitul Maal wat Tamwil (BMT), a model of Islamic microfinance institution (IMFI), has emerged in Indonesia in the last two decades. Although BMTs were not initially created for women, they have embraced women as their primary beneficiaries. The main objective of this study is to examine the link between BMTs and women's empowerment. More specifically, this study aims to address three main problems. First, to observe the origins of BMTs and their affiliation, it investigates their institutional missions and their ties with women's empowerment agendas. Second, it analyzes the particular patterns with which BMTs' empower women clients. Third, to investigate the effects of BMTs' services on women. Employing a qualitative approach, this study explores four BMTs operating in Yogyakarta Special Region, Indonesia. Data were collected through semi-structured interviews, focus group discussions, document review, and field observations. Participants included BMT managers, founders, and staffs, as well as women clients and experts. This study has three main findings. First, although the majority of BMTs in Yogyakarta predominantly deal with women, from a historical perspective, there is no indication that the BMT movement in this region is related to a women's empowerment agenda. Moreover, none of the BMT institutions in this research specify women in their goals, objectives, or operations. Targeting of women as primary beneficiaries is merely intended for financial sustainability and not gender concerns. BMTs consider women to be 'a rational economic segment', who can enhance the efficiency of programs and contribute to organizational sustainability. Observing the four selected BMTs, it is found that the service orientation and character of each BMT is significantly affected by its primary affiliation. BMTs that are allied with Islamic mass organization are inclined to accentuate Islamic symbols, while BMTs that work with the government and/or international donors use such symbols less regularly. Second, this thesis demonstrates that women's empowerment in BMTs follows various models, dealing with socio-economic, religious, and environmental issues. For socio-economic empowerment, BMTs employ individual and collective empowerment. Individual empowerment, called jemput bola, is widely used by BMTs as their main means of maintaining personal relationships and member loyalty, as well as to oppose the conventional banking sector. This scheme requires BMTs to arrange rigorous meetings between clients and BMT officers. Meanwhile, collective empowerment is generally facilitated through the creation of independent groups of women based on proximity of residency. BMTs also use religious activities as instruments to deliver their mission of da'wah, to attract new members, and to monitor members' business performance. Supported by its international NGO's partners, one BMT institution has pioneered ecological projects that are integrated at the strategic level into its organizational mission and goals. Third, according to clients, the effects of BMT projects on their family and personal lives are mostly positive. Respondents reported that access to BMTs' programs andservices have fostered socio-economic and psychological benefits for women.Economically, positive outcomes have emerged from increased income, savings,and ownership as a consequence of business growth. Meanwhile, access to credit has given women social advantages, such as increased social mobility. Involvement in BMT programs has expanded women's ability to travel to places outside the province. In addition, women's participation in BMT projects has also had positive psychological contributions. Most respondents reported having more self-esteem and dignity as a result of their economic growth. The involvement of women inBMTs' religious programs also improves their religious knowledge and practice.Nevertheless, this study also demonstrates that BMTs may have a negative effect on women; one of the most apparent harmful effects of women's engagement in BMTs is their continuing dependence on loans. The importance of this study lies in several points: 1) It contributes a new understanding of the intersection between microcredit, women’s empowerment, religious and cultural problems in a Muslim-majority society. 2) There has been lack of research into the connection between the Islamic microfinance movement and women's issues in a historical and political context; this study helps fill such gaps by expanding the interdisciplinary scope of Islamic microfinance in an Indonesian setting. 3). The findings of this study enrich discussions and debates on Islamic financing and women's empowerment. This work provides the insight that women's empowerment is a universal concept that is applicable to Muslim-majority societies. 4) There has been a dearth of qualitative study studies on BMTs in Indonesia; this study addresses this gap by undertaking a qualitative approach. Future researchers could extend the research findings and reflections of this research and continue discussion of how to develop and integrate the aspects of gender, Islamic values, and microfinance. While this study has investigated the effects of BMT programs on women's lives, particularly in a Javanese setting, future researchers could expand this to the broader location and include the perspectives of spouses and other family members

    Family business: innovation and tradition in a global economy

    Get PDF
    Eighty-five percent of Italian companies are run as a family business. They are considered vital for Italian economy. The purpose of this thesis is to study how these companies challenge the global market to understand if the globalization can cause them disadvantages or benefits. The study explains what a family business is and who are the components that can be part of it. Then it focuses on the structure of the firms, how the families run their businesses and organize the tasks between the family members. This thesis considers the strategies of innovation adopted by the family to remain competitive in the national and global industry as opposite to non-family run businesses. Then it examines how the management of these businesses chooses to innovate and preserve tradition, balancing the need of renovation and the processes that helped the firm rise

    How\u27s My Network - Incentives and Impediments of Home Network Measurements

    Get PDF
    Gathering meaningful information from Home Networking (HN) environments has presented researchers with measurement strategy challenges. A measurement platform is typically designed around the process of gathering data from a range of devices or usage statistics in a network that are specifically behind the HN firewall. HN studies require a fine balance between incentives and impediments to promote usage and minimize efforts for user participation with the focus on gathering robust datasets and results. In this dissertation we explore how to gather data from the HN Ecosystem (e.g. devices, apps, permissions, configurations) and feedback from HN users across a multitude of HN infrastructures, leveraging low impediment and low/high incentive methods to entice user participation. We look to understand the trade-offs of using a variety of approach types (e.g. Java Applet, Mobile app, survey) for data collections, user preferences, and how HN users react and make changes to the HN environment when presented with privacy/security concerns, norms of comparisons (e.g. comparisons to the local environment and to other HNs) and other HN results. We view that the HN Ecosystem is more than just “the network” as it also includes devices and apps within the HN. We have broken this dissertation down into the following three pillars of work to understand incentives and impediments of user participation and data collections. These pillars include: 1) preliminary work, as part of the How\u27s My Network (HMN) measurement platform, a deployed signed Java applet that provided a user-centered network measurement platform to minimize user impediments for data collection, 2) a HN user survey on preference, comfort, and usability of HNs to understand incentives, and 3) the creation and deployment of a multi-faceted How\u27s My Network Mobile app tool to gather and compare attributes and feedback with high incentives for user participation; as part of this flow we also include related approaches and background work. The HMN Java applet work demonstrated the viability of using a Web browser to obtain network performance data from HNs via a user-centric network measurement platform that minimizes impediments for user participation. The HMN HN survey work found that users prefer to leverage a Mobile app for HN data collections, and can be incentivized to participate in a HN study by providing attributes and characteristics of the HN Ecosystem. The HMN Mobile app was found to provide high incentives, with minimal impediments, for participation with focus on user Privacy and Security concerns. The HMN Mobile app work found that 84\% of users reported a change in perception of privacy and security, 32\% of users uninstalled apps, and 24\% revoked permissions in their HN. As a by-product of this work we found it was possible to gather sensitive information such as previously attached networks, installed apps and devices on the network. This information exposure to any installed app with minimal or no granted permissions is a potential privacy concern

    An analysis of human resources performance of Tanjung Priok container terminal

    Get PDF

    Determination of Selected Course Management Systems Advantages and Challenges: A Case Study

    Get PDF
    A thesis presented to the faculty of the College of Science and Technology at Morehead State University in partial fulfillment of the requirements for the Degree of Master of Science by Dolruedee Suppacheewa on May 12, 201

    The Hob system for verifying software design properties

    Get PDF
    Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2007.Includes bibliographical references (p. 157-164).This dissertation introduces novel techniques for verifying that programs conform to their designs. My Hob system, as described in this dissertation, allows developers to statically ensure that implementations preserve certain specified properties. Hob verifies heap-based properties that can express important aspects of a program's design. The key insight behind my approach is that Hob can establish detailed software design properties--properties that lie beyond the reach of extant static analysis techniques due to scalability or precision issues-by focusing the verification task. In particular, the Hob approach applies scalable static analysis techniques to the majority of the modules of a program and very precise, unscalable, static analysis or automated theorem proving techniques to certain specific modules of that program: those that require the precision that such analyses can deliver. The use of assume/guarantee reasoning allows the analysis engine to harness the strengths of both scalable and precise static analysis techniques to analyze large programs (which would otherwise require scalable, imprecise analyses) with sufficient precision to establish detailed data structure consistency properties, e.g. heap shape properties.(cont.) A set-based specification language enables the different analysis techniques to cooperate in verifying the specified design properties. My preliminary results show that it is possible to successfully verify detailed design-level properties of benchmark applications: I have used the Hob system to verify user-relevant properties of a water molecule simulator, a web server, and a minesweeper game. These properties constrain the behaviour of the program by stating that selected sets of objects are always equal or disjoint throughout the program's execution.by Patrick Lam.Ph.D
    corecore