29 research outputs found

    IRIS RECOGNITION FAILURE IN BIOMETRICS: A REVIEW

    Get PDF
    More than twenty years iris has been claimed to be the most stable modality in human lifetime. However, the iris recognition produces ‘failure to match’ problem which made the known is unknown user or the genuine is recognized as imposter in the biometric systems. Apparently, failure to recognize the real user as in the database is due to a few assumptions: aging of the sensor, changes in how a person uses the system such as the threshold settings and template aging effect. This paper focuses on template aging effect since it is on ongoing problem faced in iris recognition. Many studies attempted several techniques to overcome the problem in every phase which consists of three general phases: the pre-processing, feature extraction and feature matching. Therefore, the purpose of this paper is to study and identify the problems in iris recognition that lead to failure-to-match in biometrics

    A Design Guideline For Non-Monetary Incentive Mechanics In Mobile Health Participatory Sensing System

    Get PDF
    Participatory sensing emphasizes the participation of citizens and community groups in the process of sensing and documenting current events in their local environment using smart phones and mobile devices. Incentive is crucial in participatory sensing data collection to attract participants to join in a participatory campaign, and to engage participants to use the participatory sensing application. The challenge in studies on non-monetary incentives is how this type of incentives should be represented in a participatory sensing system because they are inherent to the participants. This study proposes a design guideline which consists of set of mechanics and features associated with each incentive construct based on Self-determination Theory and Motivation 3.0. The design guideline is presented in a hierarchical system structure to illustrate dynamic operation of incentive mechanics with different components in participatory sensing system. Content analysis is performed on 283 mobile health monitoring application in the market to determine the reliability of the proposed incentive mechanic and features through descriptive analysis and inter-coder reliability analysis. The findings of the descriptive analysis show that a relatively small proportion of the mobile application (15 percent), addressed at least one feature that tapped on each of the incentive mechanics, and almost all apps contain a minimum of one intrinsic incentive mechanic feature. The findings obtained from inter-coder reliability analysis found 56 percent of the proposed incentive mechanic features with low reliability. Furthermore, the finding shows insignificant reliability degree for almost all extrinsic features. This study provides both theoretical, and practical contributions. On the theoretical aspect, this study provides validation on the incentive mechanics and their features that have been proposed in the design guideline. On the practical aspect, the design guideline may aid system developers and service providers to implement the incentive concepts into systems’ features and further help campaign organizers and service providers to focus on the best incentives strategy for improving participants’ performance in the next participant recruitment

    The new services in nagios: network bandwidth utility, email notification and sms alert in improving the network performance

    Get PDF
    a new feature of services in Nagios has been added to the existing system which has no such services. The bandwidth monitoring and notification system are configured for alerting the network administrators when the bandwidth of the network in an organization hits a certain threshold settings. The system sent an email alert and sms notification to the network administrator for taking further action in order to maintain the Quality of Service (QoS) in the network. All the logs file of the Nagios actions is saved in the Nagios File Logs. The analysis was conducted from the case study and problem statements. Network Development Life Cycle (NDLC) was chosen as a methodology for implementing this system in the network. Nagios is installed inside Ubuntu 10 Operating System along with Multi-Router Traffic Grapher (MRTG) and Mail Postfix. MRTG and Mail Postfix were configured to be integrated with the Nagios System. On the client side, NSClient++ has been installed, for monitoring the bandwidth and performance of windows based on operating system. The Nagios services have been improved with the implementation of sms and emails notifications since the existing services have no such utilities. With the implementation of these services to Nagios, the performance could be even better for the future

    Location-Based Access Control In Neighborhood Geosocial Network: A Case Of Emergency Assistance

    Get PDF
    To enforce safer virtual neighborhood environment, access control is essential to specify privileges or access rights to resources in neighborhood geosocial network applications. In the case of emergency circumstances, several concerns in implementing access control have been identified: (1) inefficient message sending to irrelevant recipients (2) location spoofing (3) gossip and rumors due to disclosing information to wrong audience. To address such potential risks, access control specifically tailored for neighborhood geosocial network is required. The objective of this paper is two-fold: First, to propose an access control using density-based and position-based location conditions for neighborhood geosocial network. Second, to design mySOS, a proof-of-concept prototype that incorporate the proposed access control to improve access control for emergency assistance in neighborhood geosocial network. To achieve the objectives, a combination of proposed self-organized segmentation algorithms (density-based) and resident engagement incentives (position-based) are implemented. This study contributes to a new way for access control that will determine user profile in accessing emergency assistance features in a neighborhood geosocial network application

    IoT Technological Development: Prospect And Implication For Cyberstability

    Get PDF
    Failure to address the risk poses by future technological development could cause devastating damage to public trust in the technologies. Therefore, ascendant technologies such as artificial intelligence are the key components to provide solutions for new cybersecurity threats and strengthen the capabilities of the future technological developments. In effect, ability of the technologies to prevent and withstand a cyber-attack could become the new deterrence. This paper will provide gaps to guide the government, industry, and the research community in pursuing Internet of Things (IoT) technological development that may be in need of improvement. The contribution of this paper is as follows: First, a roadmap that outline security requirements and concerns of future technology and the significant of IoT technology in addressing the concerns. Second, an assessment that illustrates the expected and unexpected impact of future technology adoption and its significant geopolitical implication on potential impacted areas such as regulatory, legal, political, military, and intelligence

    Progress-Based Strategy For User Engagement In mHealth Participatory Sensing

    Get PDF
    For a long time, outcome-based strategy is used as a basis of health standard in wellness program. However, in the case of mHealth participatory sensing the strategy is not always pertinent because the user of the platform is not limited to patient only, but also by a person who used the system for wellness maintenance, and by the stakeholders that collect and analyze information. To improve community’s engagement on health wellness and maintenance, we propose myCommHealth that emphasizes on progress-based strategy. myCommHealth is an open data collection platform using mobile devices and allow community and stakeholder to collect, analyze and submit or share health related The objective of this paper is two-fold: First, to explore the design principle behind progress-based strategy for user engagement in mHealth participatory sensing system. Second, to propose myCommHealth, a proof-of-concept prototype that incorporate intrinsic incentive, feedback, and self-monitoring tools to improve user participation in wellness and health-maintenance campaign

    The new services in nagios network bandwidth utility email notification and sms alert in improving the network performance

    Get PDF
    A new feature of services in Nagios has been added to the existing system which has no such services. The bandwidth monitoring and notification system are configured for alerting the network administrators when the bandwidth of the network in an organization hits a certain threshold settings. The system sent an email alert and sms notification to the network administrator for taking further action in order to maintain the Quality of Service (QoS) in the network. All the logs file of the Nagios actions is saved in the Nagios File Logs. The analysis was conducted from the case study and problem statements. Network Development Life Cycle (NDLC) was chosen as a methodology for implementing this system in the network. Nagios is installed inside Ubuntu 10 Operating System along with Multi-Router Traffic Grapher (MRTG) and Mail Postfix. MRTG and Mail Postfix were configured to be integrated with the Nagios System. On the client side, NSClient++ has been installed, for monitoring the bandwidth and performance of windows based on operating system. The Nagios services have been improved with the implementation of sms and emails notifications since the existing services have no such utilities. With the implementation of these services to Nagios, the performance could be even better for the futur

    Analysis Of Phishing Susceptibility In A Workplace: A Big-Five Personality Perspectives

    Get PDF
    Employee is frequently referred to as the weakest link in the cyber security in an organization. Differences in the employees’ personality makes it hard for any organization to design a proper mitigation strategy in order to prevent them from being a victim of phishing attack. Besides, users’ general life experience and technological experience will also influence the type of user’s personality traits while handling or interacting with the security system, which affects their susceptibility towards phishing. The objective of this paper is to examine the personality traits that influence phishing susceptibility among employees in a workplace, and to investigate the influence of employees’ experience in shaping employees’ personality and consequently their behaviour in resisting phishing attack. This study used quantitative method. A survey (N = 252) of employees in mid-sized IT related companies in Malaysia attempted to identify individual’s characteristics that relate to phishing susceptibility and characterize the higherrisk employees that pose threats to the companies. This paper presents three notable findings. First, the results of correlation analysis emphasized the importance of employees’ technical and general experience in shaping their personality to resist phishing attack. Secondly, the results of correlation analysis show that conscientiousness and self-monitoring personality traits were positively related with employee’s secure behaviour towards phishing threats. Finally, this study concluded that extroversion personality had the strongest influence towards phishing susceptibility, followed by self-monitoring, agreeableness and conscientiousness. The findings suggest that there is an inverse influence between personality traits (independent variables) and user behaviour (dependent variable). The proposed framework is useful for research attempting to shift concern on human factors in order to help organization improving employees’ cyber security complianc

    Developing Cross-Lingual Sentiment Analysis Of Malay Twitter Data Using Lexicon-Based Approach

    Get PDF
    Sentiment analysis is a process of detecting and classifying sentiments into positive, negative or neutral. Most sentiment analysis research focus on English lexicon vocabularies. However, Malay is still under-resourced. Research of sentiment analysis in Malaysia social media is challenging due to mixed language usage of English and Malay. The objective of this study was to develop a cross-lingual sentiment analysis using lexicon based approach. Two lexicons of languages are combined in the system, then, the Twitter data were collected and the results were determined using graph. The results showed that the classifier was able to determine the sentiments. This study is significant for companies and governments to understand people's opinion on social network especially in Malay speaking regions

    Automation-Testing For Monitoring The Network Health Of Manufacturing Web-Based Application

    Get PDF
    In this research, automation-testing approach is proposed to monitor the manufacturing web-based health application. Current monitoring system indicates that all components such as servers, applications, services, ports and URLs are not in critical condition, but operator on the production site could not operate the manufacturing application. The proposed approach will monitor the standard operation in manufacturing web-based application and determine the health state of the whole production. Automated script is executed and response time is captured as the performance indicator. A web-based reporting will display response times mapped in different graphs. From the preliminary testing result, graphs are compared and analyze. Finally, the comparison result will determine the abnormalities of the manufacturing application
    corecore