9 research outputs found
Design and Implementation of a Student Attendance System Using Iris Biometric Recognition
Attendance taking is a standard practice in every educational system. The methods used to take class attendance are quite numerous but emphasis keeps shifting towards automating the process. The use of biometrics in taking class attendance is fast gaining ground and the traditional way of taking attendance is fast losing ground especially when the class is very large and time is of great essence. The iris was used as the biometric in this paper. After enrolling all attendees by storing their particulars along with their unique iris template, the designed system automatically took class attendance by capturing the eye image of each attendee, recognizing their iris, and searching for a match in the created database. The designed prototype is also web based. This paper proposes an alternative and accurate method of taking attendance that is both spoofproof and relatively cheap to implement
QUALITATIVE COMPARISONS OF ELICITATION TECHNIQUES IN REQUIREMENT ENGINEERING
It is often emphasized that the quality of elicited requirement is mostly influenced by the elicitation techniques
employed to gather software requirements. Many elicitation techniques have been presented in requirement engineering but
they are hardly adopted in practice as the available empirical and comparative evaluations are inadequate to guide the
software industry on which technique is better. Classifying a selection of seven requirement elicitation techniques as
collaborative, individual or contextual, this study compares the popular techniques using two groups of qualitative criteria -
terms of information collection and quality of feedback information. The evaluation results are tabulated and the findings
are depicted by spider diagrams. The study concludes that each technique has its strengths and weaknesses, the factors
software engineers should weigh when selecting appropriate techniques for requirement elicitation
Fingerprint Biometric Authentication Based Point of Sale Terminal
Retail businesses that are not transacted online still represent a substantial amount of retail deals that
are closed on a daily basis. Retail business owners and customers continue to explore other means of
ensuring payments made with Point of Sale (POS) devices are done securely. This paper proposes the
incorporation of fingerprint biometric recognition as an additional layer of protection to the customary
pin and password requirements to gain permission to pay for goods purchased and services rendered
using point of sale devices. The proposed fingerprint biometric recognition point of sale device has zero
false match and false non‐match rate. This strengthens the present authentication process that makes
use of pins and passwords that are prone to fraud and solidifies the trust and confidence users place on
point of sale devices
Integration of Iris Biometrics in Automated Teller Machines for Enhanced User Authentication
The ubiquitous Automatic Teller Machine that revolutionized the way monetary transactions are carried
out the world over is currently riddled with several security challenges. Top on the list of these
challenges are the thefts and frauds associated with the ever popular Personal Identification Number
based automatic teller machines. A lot of suggestions and proposals have been made in recent times, on
how to combat the menace of automatic teller machine frauds. Biometrics is one of the most promising
tools that have the capacity to put the nefarious activities around automatic teller machines in check.
This paper proposes a cheap and economic iris biometric based automatic teller machine, built around a
microcontroller, iris scanner and a robust database. The designed and implemented prototype is capable
of checkmating automatic teller machine fraud and it is also easy to implement in developing nations
Cryptography and the Improvement of Security in Wireless Sensor Networks
A wireless network consisting multiple (ranging from a few hundreds to thousands) nodes which are sparsely dispersed and have dedicated sensors for monitoring, recording, detecting environment and gathering environmental data (e.g. light, sound, temperature, pressure, wind speed, directions, motion, etc.) is usually known as a Wireless Sensor Network (WSN). These nodes are self-organizing and are not controlled by a central administrator. The wide adoption and deployment rate of WSN is as a result of the processing power, wireless communication and the sensing technology that the WSN possesses. The numerous advantages this network holds has led to its growth. As the deployment and acceptability of WSN increases, the vulnerability to attacks is increasing hence the need for effective security mechanisms. Encryption has proven to be a reliable way of data protection hence its adoption in the improvement of the security level in WSNs. Identifying suitable encryption mechanism for WSNs has proven to be a challenge due to the limited amount of energy, computation capability and storage resources of the sensor nodes. This paper addresses the security challenges in wireless sensor networks and effects of cryptography in the bid of improving its security
Structuring Challenges in Requirement Engineering Techniques
Experts in the field of requirement engineering have called for advancement in requirement structuring techniques as majority of the techniques are inadequate and give inconsistent results. This paper reviews the advancement in these techniques by answering the following questions: What is requirement structuring? What are the benefits of requirements structuring in the software engineering process? Who are the stakeholders involved the requirements structuring process? When do we structure requirements and what are the techniques and methods involved in requirements structuring? Addressing these questions from the requirement structuring perspectives, issues on software engineering were highlighted and discussed
Internet service providers responsibilities in botnet mitigation: a Nigerian perspective
Botnet-based attack is dangerous and extremely difficult to overcome as all the primary mitigation methods are passive and limited in focus. A combine efforts of internet service providers (ISPs) are better guides since they can monitor the traffic that traverse through their networks. However, ISPs are not legally banded to this role and may not view security as a primary concern. Towards understudying the involvement of ISPs in Botnet mitigation in Nigeria, this study elicited and summarized mitigation measures from scientific literatures to create a reference model which was validated by structured interview. Although, ISPs role is seen to be voluntary and poorly incentivized, the providers still take customers security very serious but concentrate more on the preventive and notification measures
Impacts of Trust Factors and Task Technology Fit on the Use of E-Payment Systems in Nigeria Order a copy of this article
This study investigates the impacts of initial trust model, knowledge based model and task technology
fit on the usage behaviour of retail e-payment systems users. Four theoretical models were conceptually
integrated to have an holistic view of factors influencing e-payment usage in Nigeria. A survey instrument was
designed and administered to 350 respondents out of which 258 valid responses were obtained for statistical
analysis. Variance-based structural equation modeling (SEM) technique was employed with the use of SmartPLS
to clarify the relationships amongst the study constructs. Result of the analysis revealed that task technology fit
and performance expectance are important influencing factors although, social influence and initial trust prove
most influential to behavioral intention towards e-payment use. Financial institutions need to be more apt in
commitments to promises in rendering services. Stability of the banking institution and the quality of services
offered by the financial institutions are needed to establish trust
QUALITATIVE ASSESSMENT OF SYSTEMATIC LITERATURES IN SOFTWARE ENGINEERING
Several systematic literature reviews (SLRs) have been published on many aspects of Software engineering (SE) in the last two decades. However, researchers are yet to evaluate the quality of those studies in order to determine the reliability of their findings. This work employed SLR method and performed automated search of studies published between 2012 and 2017 aiming at evaluating the quality of the recent SLRs published in SE. This paper adapted Dybå and Dingsøyr quality criteria using dichotomous scale of grading to assess the quality of the primary studies in SLRs. A total of 15 of 53 primary studies have suitable recruitment strategy for their research aims, and 19 mentioned the control group (s) with wish their methods were compared. All the 53 papers passed all the standard quality conditions. The quality of the SLRs are high with only very small percentage failing in three out of 11 quality criteria. The research methodologies applied in their primary studies are comprehensive and were based on clear description of the context, thereby making their findings valid and reliable. The current SLRs in SE are of good quality but adequate consideration should be given to the relationship between the researchers and the participants