48 research outputs found

    Non-minutiae based fingerprint descriptor

    Get PDF

    Smart Monitoring and Control in the Future Internet of Things

    Get PDF
    The Internet of Things (IoT) and related technologies have the promise of realizing pervasive and smart applications which, in turn, have the potential of improving the quality of life of people living in a connected world. According to the IoT vision, all things can cooperate amongst themselves and be managed from anywhere via the Internet, allowing tight integration between the physical and cyber worlds and thus improving efficiency, promoting usability, and opening up new application opportunities. Nowadays, IoT technologies have successfully been exploited in several domains, providing both social and economic benefits. The realization of the full potential of the next generation of the Internet of Things still needs further research efforts concerning, for instance, the identification of new architectures, methodologies, and infrastructures dealing with distributed and decentralized IoT systems; the integration of IoT with cognitive and social capabilities; the enhancement of the sensing–analysis–control cycle; the integration of consciousness and awareness in IoT environments; and the design of new algorithms and techniques for managing IoT big data. This Special Issue is devoted to advancements in technologies, methodologies, and applications for IoT, together with emerging standards and research topics which would lead to realization of the future Internet of Things

    Biometrics

    Get PDF
    Biometrics uses methods for unique recognition of humans based upon one or more intrinsic physical or behavioral traits. In computer science, particularly, biometrics is used as a form of identity access management and access control. It is also used to identify individuals in groups that are under surveillance. The book consists of 13 chapters, each focusing on a certain aspect of the problem. The book chapters are divided into three sections: physical biometrics, behavioral biometrics and medical biometrics. The key objective of the book is to provide comprehensive reference and text on human authentication and people identity verification from both physiological, behavioural and other points of view. It aims to publish new insights into current innovations in computer systems and technology for biometrics development and its applications. The book was reviewed by the editor Dr. Jucheng Yang, and many of the guest editors, such as Dr. Girija Chetty, Dr. Norman Poh, Dr. Loris Nanni, Dr. Jianjiang Feng, Dr. Dongsun Park, Dr. Sook Yoon and so on, who also made a significant contribution to the book

    HOME ENERGY MANAGEMENT SYSTEM FOR DEMAND RESPONSE PURPOSES

    Get PDF
    The growing demand for electricity has led to increasing efforts to generate and satisfy the rising demand. This led to suppliers attempting to reduce consumption with the help of the users. Requests to shift unnecessary loads off the peak hours, using other sources of generators to supply the grid while offering incentives to the users have made a significant effect. Furthermore, automated solutions were implemented with the help of Home Energy Management Systems (HEMS) where the user can remotely manage household loads to reduce consumption or cost. Demand Response (DR) is the process of reducing power consumption in a response to demand signals generated by the utility based on many factors such as the Time of Use (ToU) prices. Automated HEMS use load scheduling techniques to control house appliances in response to DR signals. Scheduling can be purely user-dependent or fully automated with minimum effort from the user. This thesis presents a HEMS which automatically schedules appliances around the house to reduce the cost to the minimum. The main contributions in this thesis are the house controller model which models a variety of thermal loads in addition to two shiftable loads, and the optimizer which schedules the loads to reduce the cost depending on the DR signals. The controllers focus on the thermal loads since they have the biggest effect on the electricity bill, they also consider many factors ignored in similar models such as the physical properties of the room/medium, the outer temperatures, the comfort levels of the users, and the occupancy of the house during scheduling. The DR signal was the hourly electricity price; normally higher during the peak hours. Another main part of the thesis was studying multiple optimization algorithms and utilizing them to get the optimum scheduling. Results showed a maximum of 44% cost reduction using different metaheuristic optimization algorithms and different price and occupancy schemes

    Novel Template Ageing Techniques to Minimise the Effect of Ageing in Biometric Systems

    Get PDF
    ect of ageing on biometric systems and particularly its impact on face recognition systems. Being biological tissue in nature, facial biometric trait undergoes ageing. As a result developing biometric applications for long-term use becomes a particularly challenging task. Despite the rising attention on facial ageing, longitudinal study of face recognition remains an understudied problem in comparison to facial variations due to pose, illumination and expression changes. Regardless of any adopted representation, biometric patterns are always affected by the change in the face appearance due to ageing. In order to overcome this problem either evaluation of the changes in facial appearance over time or template-age transformation-based techniques are recommended. By using a database comprising images acquired over a 5-years period, this thesis explores techniques for recognising face images for identify verification. A detailed investigation analyses the challenges due to ageing with respect to the performance of biometric systems. This study provides a comprehensive analysis looking at both lateral age as well as longitudinal ageing. This thesis also proposes novel approaches for template ageing to compensate the ageing effects for verification purposes. The approach will explore both linear and nonlinear transformation mapping methods. Furthermore, the compound effect of ageing with other variate (such as gender, age group) are systematically analysed. With the implementation of the novel approach, it can be seen that the GAR (Genuine Accept Rate) improved signif

    Biometric Systems

    Get PDF
    Biometric authentication has been widely used for access control and security systems over the past few years. The purpose of this book is to provide the readers with life cycle of different biometric authentication systems from their design and development to qualification and final application. The major systems discussed in this book include fingerprint identification, face recognition, iris segmentation and classification, signature verification and other miscellaneous systems which describe management policies of biometrics, reliability measures, pressure based typing and signature verification, bio-chemical systems and behavioral characteristics. In summary, this book provides the students and the researchers with different approaches to develop biometric authentication systems and at the same time includes state-of-the-art approaches in their design and development. The approaches have been thoroughly tested on standard databases and in real world applications

    Advanced user authentification for mobile devices

    Get PDF
    Access to the full-text thesis is no longer available at the author's request, due to 3rd party copyright restrictions. Access removed on 28.11.2016 by CS (TIS).Metadata merged with duplicate record ( http://hdl.handle.net/10026.1/1101 - now deleted) on 20.12.2016 by CS (TIS).Recent years have witnessed widespread adoption of mobile devices. Whereas initial popularity was driven by voice telephony services, capabilities are now broadening to allow an increasing range of data orientated services. Such services serve to extend the range of sensitive data accessible through such devices and will in turn increase the requirement for reliable authentication of users. This thesis considers the authentication requirements of mobile devices and proposes novel mechanisms to improve upon the current state of the art. The investigation begins with an examination of existing authentication techniques, and illustrates a wide range of drawbacks. A survey of end-users reveals that current methods are frequently misused and considered inconvenient, and that enhanced methods of security are consequently required. To this end, biometric approaches are identified as a potential means of overcoming the perceived constraints, offering an opportunity for security to be maintained beyond pointof- entry, in a continuous and transparent fashion. The research considers the applicability of different biometric approaches for mobile device implementation, and identifies keystroke analysis as a technique that can offer significant potential within mobile telephony. Experimental evaluations reveal the potential of the technique when applied to a Personal Identification Number (PIN), telephone number and text message, with best case equal error rates (EER) of 9%, 8% and 18% respectively. In spite of the success of keystroke analysis for many users, the results demonstrate the technique is not uniformly successful across the whole of a given population. Further investigation suggests that the same will be true for other biometrics, and therefore that no single authentication technique could be relied upon to account for all the users in all interaction scenarios. As such, a novel authentication architecture is specified, which is capable of utilising the particular hardware configurations and computational capabilities of devices to provide a robust, modular and composite authentication mechanism. The approach, known as IAMS (Intelligent Authentication Management System), is capable of utilising a broad range of biometric and secret knowledge based approaches to provide a continuous confidence measure in the identity of the user. With a high confidence, users are given immediate access to sensitive services and information, whereas with lower levels of confidence, restrictions can be placed upon access to sensitive services, until subsequent reassurance of a user's identity. The novel architecture is validated through a proof-of-concept prototype. A series of test scenarios are used to illustrate how IAMS would behave, given authorised and impostor authentication attempts. The results support the use of a composite authentication approach to enable the non-intrusive authentication of users on mobile devices.Orange Personal Communication Services Ltd

    Applications of Internet of Things

    Get PDF
    This book introduces the Special Issue entitled “Applications of Internet of Things”, of ISPRS International Journal of Geo-Information. Topics covered in this issue include three main parts: (I) intelligent transportation systems (ITSs), (II) location-based services (LBSs), and (III) sensing techniques and applications. Three papers on ITSs are as follows: (1) “Vehicle positioning and speed estimation based on cellular network signals for urban roads,” by Lai and Kuo; (2) “A method for traffic congestion clustering judgment based on grey relational analysis,” by Zhang et al.; and (3) “Smartphone-based pedestrian’s avoidance behavior recognition towards opportunistic road anomaly detection,” by Ishikawa and Fujinami. Three papers on LBSs are as follows: (1) “A high-efficiency method of mobile positioning based on commercial vehicle operation data,” by Chen et al.; (2) “Efficient location privacy-preserving k-anonymity method based on the credible chain,” by Wang et al.; and (3) “Proximity-based asynchronous messaging platform for location-based Internet of things service,” by Gon Jo et al. Two papers on sensing techniques and applications are as follows: (1) “Detection of electronic anklet wearers’ groupings throughout telematics monitoring,” by Machado et al.; and (2) “Camera coverage estimation based on multistage grid subdivision,” by Wang et al
    corecore