36 research outputs found

    Enhancement of Security in RFID using RSA Algorithm

    Get PDF
    A huge revolution has occurred in Radio Frequency Identification (RFID) technologies during the past decades. More vendors are involved, and have invested in this technology, which promises wholesale changes across a broad spectrum of business activities. Currently, RFID systems are usually available in low, high, ultra-high, and microwave frequencies with passive, semi-passive (or semi-active) and active transponders or tags. Tags might be either Chipless, or contain a microchip with read only, or read and write memory. The component controlling communication in a RFID system is called a reader or interrogator, which can be stationary or portable depending on the application. In order for the tags to transmit their data, the tags must be in the reader’s field or interrogation zone, and receive the necessary energy (in form of radio waves) from the reader. Although promising, RFID is not without its challenges, which arise from both a technological and usage point of View (IT Pro, 2005).  A common concern with RFID is data security. Data Security is a key area in RFID usage, it determines wholly whether this technology will be adopted fully especially in this part of the world (Eastern and Central Africa) for business processes and automation. For this technology to be utilized fully and realized then the users of the system MUST be assured of their data’s security.People who use devices that carry personal financial information, such as credit card or other ID numbers, do not want others to access their accounts. These are significant security vulnerabilities in RFID. Some researchers have proposed schemes that would require tags to authenticate readers, thus transmitting information only to authorized readers.This research paper addresses the security challenge in RFID by proposing RSA algorithm as a viable solution to encrypt data over transmission and also authenticate the reader and the tags. Keywords: RFID, Security, authenticate, Data Security

    Factors Affecting Acceptance, Adoption and Use of Online SNS by Seniors

    Get PDF
    The use of Online Social Networks is higher among the youth as compared to the use of the same by seniors in Kenya. Online social networking has the potential to enrich the lives of seniors by providing them with an easy way to stay in touch with friends and family. Software Engineers and designers are anxious to capture the needs of this demographic through this new channel. Yet very little is known about what influences seniors to use online social networks in relation to development and design of this online social networks.This study uses results from a pilot study conducted in some Universities in Kenya as well as theory and literature to identify and examine what key factors influence seniors to accept and use online social networks then map the factors to enhance an already existing model Unified Theory of Acceptance and Use of Technology (UTAUT) used to explain Acceptance and Use of technology. The enhanced model that emerged describes the key factors that influence acceptance and use. Specifically the model indicates that perceived privacy, security and trust, proclivity to give and get information, content of Online Social Networking Sites(SNS) are some of the key factors that influence seniors to use online social networks. The enhanced model is a first step of an ongoing research project that aims to provide software engineers and designers with the requirements of seniors in Online Social Networks. Keywords: Online Social Networks, Elderly, UTAUT, SNS, Online Social Networking Use and Acceptance

    Feature Based Data Anonymization for High Dimensional Data

    Get PDF
    Information surges and advances in machine learning tools have enable the collection and storage of large amounts of data. These data are highly dimensional.  Individuals are deeply concerned about the consequences of sharing and publishing these data as it may contain their personal information and may compromise their privacy. Anonymization techniques have been used widely to protect sensitive information in published datasets. However, the anonymization of high dimensional data while balancing between privacy and utility is a challenge. In this paper we use feature selection with information gain and ranking to demonstrate that the challenge of high dimensionality in data can be addressed by anonymizing attributes with more irrelevant features. We conduct experiments with real life datasets and build classifiers with the anonymized datasets. Our results show that by combining feature selection with slicing and reducing the amount of data distortion for features with high relevance in a dataset, the utility of anonymized dataset can be enhanced. Keywords: High Dimension, Privacy, Anonymization, Feature Selection, Classifier, Utility DOI: 10.7176/JIEA/9-2-03 Publication date: April 30th 201

    A Metrics-based Framework for Estimating the Maintainability of Object-Oriented Software

    Get PDF
    Time,  effort  and  money  required  in  maintaining software has always  been  considered  greater  than  its  development  time. Also, its ambiguity in forecast at early stage of software development makes the process more complicated. The early estimation of maintainability will significantly help software designers to adjust the software product, if there is any fault, in early stages of designing. By doing this; time, effort and money required in maintaining software will be lessened. Although Object Oriented Software Development (OOSD) approach is equipped for enhancing software maintainability, a method for finding out if the required level of maintenance is being achieved amid the development process is required. This can be accomplished through measurement. This paper outlines the need and importance of maintainability at design phase and develops a Metrics-Based Maintainability Estimation Framework for Object-Oriented software(MEFOOS) that estimates the maintainability of object oriented software components in regard of their Understandability, Modifiability and Portability—which are the sub-attributes of maintainability. Keywords: Software maintenance, Software Maintainability, maintainability model, Software Metrics, Software Component DOI: 10.7176/JIEA/9-4-02 Publication date:June 30th 201

    Using Keystroke Dynamics and Location Verification Method for Mobile Banking Authentication.

    Get PDF
    With the rise of security attacks on mobile phones, traditional methods to authentication such as Personal Identification Numbers (PIN) and Passwords are becoming ineffective due to their limitations such as being easily forgettable, discloser, lost or stolen. Keystroke dynamics is a form of behavioral biometric based authentication where an analysis of how users type is monitored and used in authenticating users into a system. The use of location data provides a verification mechanism based on user’s location which can be obtained via their phones Global Positioning System (GPS) facility. This study evaluated existing authentication methods and their performance summarized. To address the limitations of traditional authentication methods this paper proposed an alternative authentication method that uses Keystroke dynamics and location data. To evaluate the proposed authentication method experiments were done through use of a prototype android mobile banking application that captured the typing behavior while logging in and location data from 60 users. The experiment results were lower compared to the previous studies provided in this paper with a False Rejection Rate (FRR) of 5.33% which is the percentage of access attempts by legitimate users that have been rejected by the system and a False Acceptance Rate (FAR) of 3.33% which is the percentage of access attempts by imposters that have been accepted by the system incorrectly, giving an Equal Error Rate (EER) of 4.3%.The outcome of this study demonstrated keystroke dynamics and location verification on PINs as an alternative authentication of mobile banking transactions building on current smartphones features with less implementation costs with no additional hardware compared to other biometric methods. Keywords: smartphones, biometric, mobile banking, keystroke dynamics, location verification, securit

    A review of multi-omics data integration through deep learning approaches for disease diagnosis, prognosis, and treatment

    Get PDF
    Accurate diagnosis is the key to providing prompt and explicit treatment and disease management. The recognized biological method for the molecular diagnosis of infectious pathogens is polymerase chain reaction (PCR). Recently, deep learning approaches are playing a vital role in accurately identifying disease-related genes for diagnosis, prognosis, and treatment. The models reduce the time and cost used by wet-lab experimental procedures. Consequently, sophisticated computational approaches have been developed to facilitate the detection of cancer, a leading cause of death globally, and other complex diseases. In this review, we systematically evaluate the recent trends in multi-omics data analysis based on deep learning techniques and their application in disease prediction. We highlight the current challenges in the field and discuss how advances in deep learning methods and their optimization for application is vital in overcoming them. Ultimately, this review promotes the development of novel deep-learning methodologies for data integration, which is essential for disease detection and treatment

    An Improved Model for the Implementation of Web-Based Learning in Adult Secondary School Education in Kenya

    Get PDF
    The development of technology, which evolves continuously, has led to the transformation of traditional courses into web-based courses. However, as these e-learning systems grow more complex, involving numerous users with different levels of need, there is a need to have web-based learning models that adequately address such users’ needs, taking into consideration their levels of expertise, access and ability to interact with such systems. Most of the existing models present the adult learners with difficulties, as most of them have to concentrate mostly on learning the technology rather than learning the desired content. Most of the difficulties arise from the web-based learning model configurations in use in the country. The majority lack features and capabilities of highly interactive, fast-paced multimedia-supported learning currently demanded by most learners and tutors. Therefore, the main aim of this research was to devise an improved model for implementing a web-based learning programme in adult secondary school education. After analysing the existing models and establishing their operational challenges, an improved model was proposed. The proposed model was statistically tested using sample data. The results showed that recognizing both technological and user attributes along the recognized theoretical frameworks was important in increasing the users’ behavioural inclination to use the improved model. Therefore, it is recommended that more sensitization to web-based learning should be implemented by the adult education department in the Ministry of Education among adult learners in the country. It is also recommended that system developers should find ways of incorporating additional features into the model without affecting its architecture and function. Finally, there is need for future studies on the causal antecedents of the constructs presented in this research model to provide more precise practical implications

    Alternative Framework for Enhancing Image Quality of the Fingerprint

    Get PDF
    Fingerprint Identification is one of the most popular biometric methods used to verify and identify a person; formally it is defined as “The pattern of ridges and furrows on an individual finger”. Ridges are the lines in thumb and furrow is shallow trench of skin on an individual’s finger. Furrow is also referred to as valley. The combination of ridges and furrows makes an individual’s fingerprint and it’s called minutiae. A critical step in Fingerprint is to automatically and reliably extract minutiae from input finger print images. However the performance of the Minutiae extraction algorithm and other fingerprint recognition techniques relies heavily on the quality of the input fingerprint image. In order to ensure that the performance of the minutiae extraction algorithm will be robust with respect to the quality of input fingerprint images, an enhancement framework which can improve the clarity of the ridge structures is necessary. In this paper we reviewed, analyzed and evaluated some of the existing frameworks for image enhancement of the fingerprint which used Image or Minutiae Based and anticipated outcome of this effort is alternative hybrid framework of enhancing fingerprint image quality, that is a more proactive and consistent approach of improvement, 100 fingerprint from 4 DBs of FVC2006 was used for experiment and tested in MATLAB & Adobe Photoshop image processing Software’s, result indicates that proposed enhancement framework improved gap knowledge of the analyzed existing frameworks and Fingerprint were enhanced by correcting and removing noise from the input fingerprint

    A Framework for an E-government Based on Service Oriented Artichitecture

    Get PDF
    Electronic government is use of information and communication technologies in government to provide public services, to improve managerial effectiveness and to promote democratic values; as well as a regulatory framework that facilitates information intensive initiatives and fosters the knowledge society. To develop framework for an e-government may dynamically change in e-Government system requirements and the need for a highly autonomous approach for government agencies. The public Agency Professional Survey is based on service oriented architecture that will be used to gather the benefits experienced by departments that are currently involved in the e-Government initiatives. The expected findings may include the outcome of the implementation of e-Government initiatives in terms of operational efficiency and organizational effectiveness towards the online public services delivery channel. The study e-Government Based on Service Oriented Architecture will be helpful in implementation framework of e-Government in Governments

    An Alternative Model to Overcoming Two Phase Commit Blocking Problem

    Get PDF
    In distributed transactions, the atomicity requirement of the atomic commitment protocol should be preserved. The two phased commit protocol algorithm is widely used to ensure that transactions in distributed environment are atomic. However, a main drawback was attributed to the algorithm, which is a blocking problem. The system will get in stuck when participating sites or the coordinator itself crashes. To address this problem a number of algorithms related to 2PC protocol were proposed such as back up coordinator and a technique whereby the algorithm passes through 3PC during failure. However, both algorithms face limitations such as multiple site and backup coordinator failures. Therefore, we proposed an alternative model to overcoming the blocking problem in combined form. The algorithm was simulated using Britonix transaction manager (BTM) using Eclipse IDE and MYSQL. In this paper, we assessed the performance of the alternative model and found that this algorithm handled site and coordinator failures in distributed transactions using hybridization (combination of two algorithms) with minimal communication messages
    corecore