9 research outputs found

    Design and Implementation of a Student Attendance System Using Iris Biometric Recognition

    Get PDF
    Attendance taking is a standard practice in every educational system. The methods used to take class attendance are quite numerous but emphasis keeps shifting towards automating the process. The use of biometrics in taking class attendance is fast gaining ground and the traditional way of taking attendance is fast losing ground especially when the class is very large and time is of great essence. The iris was used as the biometric in this paper. After enrolling all attendees by storing their particulars along with their unique iris template, the designed system automatically took class attendance by capturing the eye image of each attendee, recognizing their iris, and searching for a match in the created database. The designed prototype is also web based. This paper proposes an alternative and accurate method of taking attendance that is both spoofproof and relatively cheap to implement

    QUALITATIVE COMPARISONS OF ELICITATION TECHNIQUES IN REQUIREMENT ENGINEERING

    Get PDF
    It is often emphasized that the quality of elicited requirement is mostly influenced by the elicitation techniques employed to gather software requirements. Many elicitation techniques have been presented in requirement engineering but they are hardly adopted in practice as the available empirical and comparative evaluations are inadequate to guide the software industry on which technique is better. Classifying a selection of seven requirement elicitation techniques as collaborative, individual or contextual, this study compares the popular techniques using two groups of qualitative criteria - terms of information collection and quality of feedback information. The evaluation results are tabulated and the findings are depicted by spider diagrams. The study concludes that each technique has its strengths and weaknesses, the factors software engineers should weigh when selecting appropriate techniques for requirement elicitation

    Fingerprint Biometric Authentication Based Point of Sale Terminal

    Get PDF
    Retail businesses that are not transacted online still represent a substantial amount of retail deals that are closed on a daily basis. Retail business owners and customers continue to explore other means of ensuring payments made with Point of Sale (POS) devices are done securely. This paper proposes the incorporation of fingerprint biometric recognition as an additional layer of protection to the customary pin and password requirements to gain permission to pay for goods purchased and services rendered using point of sale devices. The proposed fingerprint biometric recognition point of sale device has zero false match and false non‐match rate. This strengthens the present authentication process that makes use of pins and passwords that are prone to fraud and solidifies the trust and confidence users place on point of sale devices

    Integration of Iris Biometrics in Automated Teller Machines for Enhanced User Authentication

    Get PDF
    The ubiquitous Automatic Teller Machine that revolutionized the way monetary transactions are carried out the world over is currently riddled with several security challenges. Top on the list of these challenges are the thefts and frauds associated with the ever popular Personal Identification Number based automatic teller machines. A lot of suggestions and proposals have been made in recent times, on how to combat the menace of automatic teller machine frauds. Biometrics is one of the most promising tools that have the capacity to put the nefarious activities around automatic teller machines in check. This paper proposes a cheap and economic iris biometric based automatic teller machine, built around a microcontroller, iris scanner and a robust database. The designed and implemented prototype is capable of checkmating automatic teller machine fraud and it is also easy to implement in developing nations

    Cryptography and the Improvement of Security in Wireless Sensor Networks

    Get PDF
    A wireless network consisting multiple (ranging from a few hundreds to thousands) nodes which are sparsely dispersed and have dedicated sensors for monitoring, recording, detecting environment and gathering environmental data (e.g. light, sound, temperature, pressure, wind speed, directions, motion, etc.) is usually known as a Wireless Sensor Network (WSN). These nodes are self-organizing and are not controlled by a central administrator. The wide adoption and deployment rate of WSN is as a result of the processing power, wireless communication and the sensing technology that the WSN possesses. The numerous advantages this network holds has led to its growth. As the deployment and acceptability of WSN increases, the vulnerability to attacks is increasing hence the need for effective security mechanisms. Encryption has proven to be a reliable way of data protection hence its adoption in the improvement of the security level in WSNs. Identifying suitable encryption mechanism for WSNs has proven to be a challenge due to the limited amount of energy, computation capability and storage resources of the sensor nodes. This paper addresses the security challenges in wireless sensor networks and effects of cryptography in the bid of improving its security

    Structuring Challenges in Requirement Engineering Techniques

    Get PDF
    Experts in the field of requirement engineering have called for advancement in requirement structuring techniques as majority of the techniques are inadequate and give inconsistent results. This paper reviews the advancement in these techniques by answering the following questions: What is requirement structuring? What are the benefits of requirements structuring in the software engineering process? Who are the stakeholders involved the requirements structuring process? When do we structure requirements and what are the techniques and methods involved in requirements structuring? Addressing these questions from the requirement structuring perspectives, issues on software engineering were highlighted and discussed

    Internet service providers responsibilities in botnet mitigation: a Nigerian perspective

    Get PDF
    Botnet-based attack is dangerous and extremely difficult to overcome as all the primary mitigation methods are passive and limited in focus. A combine efforts of internet service providers (ISPs) are better guides since they can monitor the traffic that traverse through their networks. However, ISPs are not legally banded to this role and may not view security as a primary concern. Towards understudying the involvement of ISPs in Botnet mitigation in Nigeria, this study elicited and summarized mitigation measures from scientific literatures to create a reference model which was validated by structured interview. Although, ISPs role is seen to be voluntary and poorly incentivized, the providers still take customers security very serious but concentrate more on the preventive and notification measures

    Impacts of Trust Factors and Task Technology Fit on the Use of E-Payment Systems in Nigeria Order a copy of this article

    Get PDF
    This study investigates the impacts of initial trust model, knowledge based model and task technology fit on the usage behaviour of retail e-payment systems users. Four theoretical models were conceptually integrated to have an holistic view of factors influencing e-payment usage in Nigeria. A survey instrument was designed and administered to 350 respondents out of which 258 valid responses were obtained for statistical analysis. Variance-based structural equation modeling (SEM) technique was employed with the use of SmartPLS to clarify the relationships amongst the study constructs. Result of the analysis revealed that task technology fit and performance expectance are important influencing factors although, social influence and initial trust prove most influential to behavioral intention towards e-payment use. Financial institutions need to be more apt in commitments to promises in rendering services. Stability of the banking institution and the quality of services offered by the financial institutions are needed to establish trust

    QUALITATIVE ASSESSMENT OF SYSTEMATIC LITERATURES IN SOFTWARE ENGINEERING

    Get PDF
    Several systematic literature reviews (SLRs) have been published on many aspects of Software engineering (SE) in the last two decades. However, researchers are yet to evaluate the quality of those studies in order to determine the reliability of their findings. This work employed SLR method and performed automated search of studies published between 2012 and 2017 aiming at evaluating the quality of the recent SLRs published in SE. This paper adapted Dybå and Dingsøyr quality criteria using dichotomous scale of grading to assess the quality of the primary studies in SLRs. A total of 15 of 53 primary studies have suitable recruitment strategy for their research aims, and 19 mentioned the control group (s) with wish their methods were compared. All the 53 papers passed all the standard quality conditions. The quality of the SLRs are high with only very small percentage failing in three out of 11 quality criteria. The research methodologies applied in their primary studies are comprehensive and were based on clear description of the context, thereby making their findings valid and reliable. The current SLRs in SE are of good quality but adequate consideration should be given to the relationship between the researchers and the participants
    corecore