12 research outputs found

    Information security and assurance : Proceedings international conference, ISA 2012, Shanghai China, April 2012

    Full text link

    Fingerprint-based biometric recognition allied to fuzzy-neural feature classification.

    Get PDF
    The research investigates fingerprint recognition as one of the most reliable biometrics identification methods. An automatic identification process of humans-based on fingerprints requires the input fingerprint to be matched with a large number of fingerprints in a database. To reduce the search time and computational complexity, it is desirable to classify the database of fingerprints into an accurate and consistent manner so that the input fingerprint is matched only with a subset of the fingerprints in the database. In this regard, the research addressed fingerprint classification. The goal is to improve the accuracy and speed up of existing automatic fingerprint identification algorithms. The investigation is based on analysis of fingerprint characteristics and feature classification using neural network and fuzzy-neural classifiers.The methodology developed, is comprised of image processing, computation of a directional field image, singular-point detection, and feature vector encoding. The statistical distribution of feature vectors was analysed using SPSS. Three types of classifiers, namely, multi-layered perceptrons, radial basis function and fuzzy-neural methods were implemented. The developed classification systems were tested and evaluated on 4,000 fingerprint images on the NIST-4 database. For the five-class problem, classification accuracy of 96.2% for FNN, 96.07% for MLP and 84.54% for RBF was achieved, without any rejection. FNN and MLP classification results are significant in comparison with existing studies, which have been reviewed

    CLASSIFYING AND RESPONDING TO NETWORK INTRUSIONS

    Get PDF
    Intrusion detection systems (IDS) have been widely adopted within the IT community, as passive monitoring tools that report security related problems to system administrators. However, the increasing number and evolving complexity of attacks, along with the growth and complexity of networking infrastructures, has led to overwhelming numbers of IDS alerts, which allow significantly smaller timeframe for a human to respond. The need for automated response is therefore very much evident. However, the adoption of such approaches has been constrained by practical limitations and administrators' consequent mistrust of systems' abilities to issue appropriate responses. The thesis presents a thorough analysis of the problem of intrusions, and identifies false alarms as the main obstacle to the adoption of automated response. A critical examination of existing automated response systems is provided, along with a discussion of why a new solution is needed. The thesis determines that, while the detection capabilities remain imperfect, the problem of false alarms cannot be eliminated. Automated response technology must take this into account, and instead focus upon avoiding the disruption of legitimate users and services in such scenarios. The overall aim of the research has therefore been to enhance the automated response process, by considering the context of an attack, and investigate and evaluate a means of making intelligent response decisions. The realisation of this objective has included the formulation of a response-oriented taxonomy of intrusions, which is used as a basis to systematically study intrusions and understand the threats detected by an IDS. From this foundation, a novel Flexible Automated and Intelligent Responder (FAIR) architecture has been designed, as the basis from which flexible and escalating levels of response are offered, according to the context of an attack. The thesis describes the design and operation of the architecture, focusing upon the contextual factors influencing the response process, and the way they are measured and assessed to formulate response decisions. The architecture is underpinned by the use of response policies which provide a means to reflect the changing needs and characteristics of organisations. The main concepts of the new architecture were validated via a proof-of-concept prototype system. A series of test scenarios were used to demonstrate how the context of an attack can influence the response decisions, and how the response policies can be customised and used to enable intelligent decisions. This helped to prove that the concept of flexible automated response is indeed viable, and that the research has provided a suitable contribution to knowledge in this important domain

    NASA RECON: Course Development, Administration, and Evaluation

    Get PDF
    The R and D activities addressing the development, administration, and evaluation of a set of transportable, college-level courses to educate science and engineering students in the effective use of automated scientific and technical information storage and retrieval systems, and, in particular, in the use of the NASA RECON system, are discussed. The long-range scope and objectives of these contracted activities are overviewed and the progress which has been made toward these objectives during FY 1983-1984 is highlighted. In addition, the results of a survey of 237 colleges and universities addressing course needs are presented

    Proceeding icoset 2017

    Get PDF

    Architecture and implementation of online communities

    Get PDF
    Thesis (Ph.D.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 1999.Includes bibliographical references.by Philip Greenspun.Ph.D

    Strategic role of internet-related technologies in supply chain networks

    Get PDF
    PhD ThesisOrganisations are operating in increasingly competitive market places. To enhance competitiveness, organisations are shifting their focus from individual supply chains to improving the responsiveness of the whole Supply Chain Network (SCN) that serves and impacts the level of final product or service provided to customers. Consequently, there has been a major upsurge of interest in the role of Internet-related technologies (IRT) in advancing SCNs. This area was examined by conducting case studies with large organisations from a range of industries that focused on the function of IRT in inter-organisational supply chain processes. A number of major themes emerged. Firstly, it is clear that IRT will be at the heart of future SCN communication surrounding enabling, operational and strategic supply chain processes. IRT provide a mechanism for integrating different supply chainrelated systems thus leading to improved information sharing and visibility. Furthermore, it widens the scope and flexibility of intra-organisational and interorganisational linkages and pathways that are available between different network members. In addition, IRT is being used to broaden and deepen relationships with key partners and within teams formed around supply chain processes. IRT can also be personalised to suit different organisations and people in the SCN and to provide appropriate access to web links, information and applications. However, it is important to understand that IRT cannot be equally applied throughout the supply chain. A number of factors will influence its suitability including the type and stage of supply chain processes, the nature of activities, the content of communication and the people communicating. The thesis will provide guidance to academics and practitioners on the strategic role of IRT. Finally, future research is recommended to investigate the additional impact that smart tags and mobile technologies will have and the long term effects of technological linkages on social relations between different network members.Division of Business Information Management and the Department of Computing, of Glasgow Caledonian University

    Implications of Socio-Technical Interactions for e-Government Implementation and its Success

    Get PDF
    e-Government projects have become a strategic enabler for public administration reform and the development of the local economy. However, there is an agreement among researchers that most e-Government implementation projects fail to achieve their goals and deliver their desired benefits. One important reason for this failure reported in the literature is that current e-Government system designs do not meet the socio-technical reality of e-Government, which is shaped by several environmental, social, political, and technical forces. Researchers emphasise that e-Government projects can continue to fail unless equal attention is devoted to these diverse aspects. On the other hand, the current e-Government stage/maturity models (e.g., Layne & Lee, 2001) offer only little awareness about the effects, implications, and attributes of the changes happening within and between organisations as e-Government projects go through design and implementation, thus falling short to fully address the socio-technical nature of e-Government. Moreover, little is known about not only how and in what ways social and technical factors interact and affect each other but also the implications of their interactions for e-Government implementation and its success. This research is set to investigate the implications of socio-technical interactions for implementing e-Government and its success, using the lens of socio-technical systems (STS) theory. This study was conducted within the previously unexplored setting of Oman using the multiple case-study method. Further, it employed semi-structured interviews as the primary data collection instrument, supported by archival analysis as a secondary data source. Oman was chosen as the context for the study due to its rapid socio-economic development in embracing an e-Government design for public administration reform. The research outcome indicated that the socio-technical factor effects identified in this study are mostly consistent with those reported in the extant literature. The findings of the analysis of socio-technical factors’ interaction, presented in terms of theoretical propositions, further support the extant literature. They demonstrated that examining e-Government implementation from the holistic view of STS theoretical lens can help significantly understand the complexity of e-Government systems. This outcome will help in identifying the various tangled issues attached to the project’s implementation and contribute towards lowering the failure rates of e-Government projects. It can also assist e-Government researchers by offering them a holistic analysis of this phenomenon to avoid the pitfalls resulting from focusing on specific aspects or dimensions of e-Government. The results of this study also offer a diagnostic tool to practitioners to gain better control over e-Government projects and provide great opportunities for avoiding potential failure and increasing the rate of success, either entirely or partially
    corecore