3,695 research outputs found

    AI, Robotics, and the Future of Jobs

    Get PDF
    This report is the latest in a sustained effort throughout 2014 by the Pew Research Center's Internet Project to mark the 25th anniversary of the creation of the World Wide Web by Sir Tim Berners-Lee (The Web at 25).The report covers experts' views about advances in artificial intelligence (AI) and robotics, and their impact on jobs and employment

    Biometric Enabled E-Banking in Nigeria: Management and Customers’ Perspectives

    Get PDF
    The adoption of biometric technology is rapidly increasing around the globe due to the increasing sensitivity of security issues. With the recent 2015-plan and collaborations of the Central Bank of Nigeria to incorporate biometrics into her banking system, it is imperative to assess the perception of the managers and customers to the use of the long-awaited biometrics for secure, seamless and successful transactions. The banking sector touches the daily lives of at least 60% of the over 150-million Nigerian population and it is expected to increase as more security measures are put in place. Therefore, this empirical evaluation captures the factors influencing the perception of the bank management and ATM users. A total of 740 respondents participated in the survey cutting across different age groups and educational backgrounds. Descriptive statistics and T-test analysis of the survey showed that management and customers of strongly support the adoption of biometric ATM in Nigeria

    Implementation of the Enhanced Fingerprint Authentication in the ATM System Using ATmega128 with GSM Feedback Mechanism

    Get PDF
    ATM was introduced to boost the cashless policy in Nigeria. Current trend of Cybercrime facilitate the need for an enhanced fingerprint application on ATM machine with GSM Feedback mechanism. The mechanism enable unassigned fingerprint authentication of customers with quick code and secret code. The project enhances the security authentication of customers using ATM. A core controller using fingerprint recognition system of ATmega128 in-system programmable flash is explored. An SM630 fingerprint module is used to capture fingerprints with DSP processor and optical sensor for verification, using AT command of GSM module for feedback text messaging (i.e. sending of Quick and Secret-Codes respectively). Upon system testing of capable reduction of ATM fraud using C program, the new method of authentication is presented

    Enhancing Security of Automated Teller Machines Using Biometric Authentication: A Case of a Sub-Saharan University

    Get PDF
    A wide variety of systems need reliable personal recognition systems to either authorize or determine the identity of an individual demanding their services. The goal of such systems is to warrant that the rendered services are accessed only by a genuine user and no one else.In the absence of robust personal recognition schemes, these systems are vulnerable to the deceits of an impostor. The ATM has suffered a lot over the years against PIN theft and other associated ATM frauds. In this research is proposed a fingerprint and PIN based authentication arrangement to enhance the security and safety of the ATM and its users. The proposed system demonstrates a three-tier design structure. The first tier is the verification module, which concentrates on the enrollment phase, enhancement phase, feature extraction and matching of the fingerprints. The second tier is the database end which acts as a storehouse for storing the fingerprints of all ATM users preregistered as templates. The last tier presents a system platform to relate banking transactions such as balance enquiries, mini statement and withdrawal. The system is developed to run on Microsoft windows Xp or higher and all systems with .NET framework employing C# programming language, Microsoft Visio studio 2010 and SQL server 2008. The simulated results showed 96% accuracy, the simulation overlooked the absence of a cash tray. The findings of this research will be meaningful to Banks and other financial institutions. Keywords:  SQL Server, ATM, Fraud, .NET framework, financial institutions DOI: 10.7176/IKM/9-7-02 Publication date: August 31st 201

    Biometric Enabled E-Banking in Nigeria: Management and Customers’ Perspectives

    Get PDF
    The adoption of biometric technology is rapidly increasing around the globe due to the increasing sensitivity of security issues. With the recent 2015-plan and collaborations of the Central Bank of Nigeria to incorporate biometrics into her banking system, it is imperative to assess the perception of the managers and customers to the use of the long-awaited biometrics for secure, seamless and successful transactions.  The banking sector touches the daily lives of at least 60% of the over 150-million Nigerian population and it is expected to increase as more security measures are put in place.  Therefore, this empirical evaluation captures the factors influencing the perception of the bank management and ATM users. A total of 740 respondents participated in the survey cutting across different age groups and educational backgrounds. Descriptive statistics and T-test analysis of the survey showed that management and customers of strongly support the adoption of biometric ATM in Nigeria. Keywords: E-Banking, Biometric, ATM,  Security

    Towards Implementing An Efficient Biometric Authentication Framework For Nigeria Customer Banking Systems

    Get PDF
    With the rapidly increasing number of break-in reports on traditional Personal Identification Number (PIN) and password security systems, there is a high demand for greater security for access to sensitive or personal information in the Nigerian Banking System. This paper reviews the current practices in Nigeria’s customer banking services; reveals the results of a survey and suggests a more efficient biometric framework for a more secured Nigeria Customer Banking System. Customer banking, which includes a wide spectrum of banking services, must be carried out with proper authentication to ensure not only the security of transactions, customers’ information and funds, but also the protection of the Banks’ global image and brand. It is clear that Information Security and Information Management tend to interrelate in innovative systems thereby triggering the need for sustainability. The uses of traditional forms of authentication such as signatures, Identity cards and PIN have not adequately met this security need. In recent times, biometric technologies have been typically used to analyze human characteristics for security purposes as biometric-based authentication serves as a solidified form of authentication for real-time security processes

    Review of personal identification systems

    Get PDF
    The growth of the use of biometric personal identification systems has been relatively steady over the last 20 years. The expected biometric revolution which was forecast since the mid 1970\u27s has not yet occurred. The main factor for lower than expected growth has been the cost and user acceptance of the systems. During the last few years, however, a new generation of more reliable, less expensive and better designed biometric devices have come onto the market. This combined with the anticipated expansion of new reliable, user friendly inexpensive systems provides a signal that the revolution is about to begin. This paper provides a glimpse into the future for personal identification systems and focuses on research directions, emerging applications and significant issues of the future

    Human-Centered Artificial Intelligence: Three Fresh Ideas

    Get PDF
    Human-Centered AI (HCAI) is a promising direction for designing AI systems that support human self-efficacy, promote creativity, clarify responsibility, and facilitate social participation. These human aspirations also encourage consideration of privacy, security, environmental protection, social justice, and human rights. This commentary reverses the current emphasis on algorithms and AI methods, by putting humans at the center of systems design thinking, in effect, a second Copernican Revolution. It offers three ideas: (1) a two-dimensional HCAI framework, which shows how it is possible to have both high levels of human control AND high levels of automation, (2) a shift from emulating humans to empowering people with a plea to shift language, imagery, and metaphors away from portrayals of intelligent autonomous teammates towards descriptions of powerful tool-like appliances and tele-operated devices, and (3) a three-level governance structure that describes how software engineering teams can develop more reliable systems, how managers can emphasize a safety culture across an organization, and how industry-wide certification can promote trustworthy HCAI systems. These ideas will be challenged by some, refined by others, extended to accommodate new technologies, and validated with quantitative and qualitative research. They offer a reframe -- a chance to restart design discussions for products and services -- which could bring greater benefits to individuals, families, communities, businesses, and society

    Currency recognition using EAST for text detection and tesseract OCR for text recognition

    Get PDF
    This research study presents a novel approach for detecting currency utilizing cutting-edge technologies such as the Efficient and Accurate Scene Text (EAST) model and Tesseract Optical Character Recognition (OCR). The EAST model is employed to identify text within scenes, whereas Tesseract OCR is utilized to effectively recognize and classify monetary units in real-time video stream input. The empirical results demonstrate the efficacy of the suggested methodology in discerning and classifying distinct monetary units, a pivotal necessity in diverse financial scenarios. The amalgamation of the EAST model with OCR can augment money identification technology, strengthening the dependability of financial services such as ATM operation and currency conversion and ultimately elevating consumer happiness during financial transactions.</p
    • …
    corecore